Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Defining Network Infrastructure and Security
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
NetComm Wireless VPN Functionality Feature Spotlight.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 11 User Datagram Protocol (UDP)
Module 5: Configuring Access for Remote Clients and Networks.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Module 10: Providing Secure Access to Remote Offices.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
Remote Access Lecture 2.
Examining Network Protocols
Chapter 4 Core TCP/IP Protocols
Virtual Private Network (VPN)
Virtual Private Networks
Security Protocols in the Internet
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Virtual Private Network zswu
Presentation transcript:

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 2 Virtual Private Networks (VPNs) Overview of VPNs PPTP L2TP/IPSec

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 3 Overview of VPNs VPN clients and servers Types of VPN connections Remote access Router-to-router VPN protocols Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol with Internet Protocol Security (L2TP/IPSec)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 4 Virtual Private Networking

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 5 Tunnelling in VPNs

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 6 Tunnelling Architecture in Windows NDIS Mini Port Wrapper

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 7 Overview of VPNs (continued) VPNs and PPP User authentication Data compression Data encryption (for PPTP) VPN address assignment VPN data compression VPN data encryption

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 8 PPTP Data Encapsulation User Data TCP UDP IP Original IP Datagram PPPGREIP Encrypted PPP Payload IP addresses based on transit network IP addresses based on private network

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 9 PPTP Control Connection PPTP control connection creation PPTP control connection maintenance PPTP control connection termination

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 10 L2TP/IPSec Data Encapsulation User Data TCP UDP IP Original IP Datagram PPPL2TPUDPIP User Data TCP UDP IPPPPL2TPUDPIP IPSec ESP Trailer IPSec AUTH Trailer IPSec ESP Header L2TP – without encryption L2TP – With IPSec encryption Original IP Datagram Encrypted with IPSec IP addresses based on transit network IP addresses based on private network

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 11 L2TP Connection L2TP connection creation L2TP connection maintenance L2TP connection termination

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 12 Review Overview of VPNs PPTP L2TP/IPSec