Security Infrastructure Overview - VPN Suresh Ramasamy.

Slides:



Advertisements
Similar presentations
Virtual Private Networks
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
UAB VPN Service David Wolford, Communications Network Specialist.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
Media Description for IKE in SDP draft-saito-mmusic-sdp-ike-01 Makoto Saito Dan Wing
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Remote Networking Architectures
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CACI Remote Access CACI has a range of remote access tools for offsite employees who need to connect to resources inside the CACI private network
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Remote Access Chicca Kusumawardani Spring Introduction Company using a remote access Is it a good idea giving employees remote access? Is it expensive.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Module 5: Configuring Access for Remote Clients and Networks.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Potential vulnerabilities of IPsec-based VPN
Module 10: Providing Secure Access to Remote Offices.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
An Analysis on NAT Security
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Networks
Security Protocols in the Internet
Providing Teleworker Services
Providing Teleworker Services
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Cengage Learning: Computer Networking from LANs to WANs
LM 5. Wireless Network Security
Providing Teleworker Services
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

Security Infrastructure Overview - VPN Suresh Ramasamy

Agenda What is VPN?What is VPN? Types of VPNTypes of VPN SSL vs IPsecSSL vs IPsec Design ConsiderationsDesign Considerations Questions?Questions?

What is VPN? Virtual Private Network allows security connectivity, either one to one, or one to many.Virtual Private Network allows security connectivity, either one to one, or one to many.

Your Network

Why do you need VPN? Secure access to your officeSecure access to your office Secure tunnelling through public network from one site to anotherSecure tunnelling through public network from one site to another EncryptedEncrypted To reach networks with private IP allocation (RFC1918)To reach networks with private IP allocation (RFC1918)

Types of VPN Remote Access VPNRemote Access VPN Site to Site VPNSite to Site VPN

VPN – the big picture

Remote Access VPN

Site to Site VPN

SSL Based VPN

SSL vs IPsec SSL requires browser with 128bit encryption supportSSL requires browser with 128bit encryption support IPsec requires client (Windows some exceptions)IPsec requires client (Windows some exceptions) Mode of authentication, supports digital certificate and password based authenticationMode of authentication, supports digital certificate and password based authentication Multi factor capable for IPSec (device dependent)Multi factor capable for IPSec (device dependent)

Design Considerations Placement of VPNPlacement of VPN –Inside or outside of firewall? Type of AuthenticationType of Authentication –Password vs. Digital Certs? Factor of AuthenticationFactor of Authentication –Single Factor, Multi Factor, Token Based –One time passwords? (RSA SecurID)

Resources ble.htmlhttp://mia.ece.uic.edu/~papers/volans/ta ble.htmlhttp://mia.ece.uic.edu/~papers/volans/ta ble.htmlhttp://mia.ece.uic.edu/~papers/volans/ta ble.html

Suggestions?