Virtual Private Networks Warren Toomey. Available WAN Links.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
v3.1 CIS151 Module 2 JEOPARDY K. MartinG. Valencia.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
CS682 – Network Management and Security Session 7.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
MPLS-based Virtual Private Networks Khalid Siddiqui CS 843 Research Paper Department of Computer Science Wichita State University Wichita, KS
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Network Connectivity Options Currently offered by Wyless.
Implementing VPN Solutions Laurel Boyer, CCIE 4918 Presented, June 2003.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Module 10: Providing Secure Access to Remote Offices.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—2-1 Implementing an EIGRP-Based Solution Lab 2-2 Debrief.
CCNA1 v3 Module 2 v3 CCNA 1 Module 2 JEOPARDY K. Martin.
Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
NETW 208 RANK The power of possibility/netw208rank.com
VPN: Virtual Private Network
Chapter 1: WAN Concepts Connecting Networks
NETW 208 Enthusiastic Studysnaptutorial.com
Net 412 (Practical Part) Networks and Communication Department LAB 2.
Virtual Private Network (VPN)
Security Protocols in the Internet
09/12/2018 Virtual Networks.
Private Networks.
Chapter 8 – Data switching and routing
Presentation transcript:

Virtual Private Networks Warren Toomey

Available WAN Links

Dedicated Links: very expensive, fixed endpoints Packet-Switched: expensive, fixed endpoints but some choice What if we need a cheaper alternative, or one where the endpoints can move around? – We have to use the Internet – Our traffic goes through other peoples’ routers

A Dilemma We want to interconnect parts of our enterprise over long distances – But we are using a public network to do so

Virtual Private Network What we want is a WAN link: link with an IP address at each end, and one which carries traffic that others cannot see VPN: Virtual Private Network Virtual: Information within a private network is transported over a public network Private: The traffic is encrypted to keep the data confidential

Benefits of VPNs Cost Savings: cheaper than dedicated links Scalability: use existing Internet connection Security: encryption ensures traffic is secure

VPN Tunnels A VPN tunnel acts like a WAN link In reality, it is a collection of public routers and LAN/WAN links Traffic enters the tunnel, and traverses the tunnel until it reaches the other end The traffic needs to be encapsulated: – Placed into the network protocol used on the physical links of the tunnel – Example: IP packets are encapsulated in IP packets

VPN Tunnels

VPN Encryption

GRE: VPN Technology Generic Routing Encapsulation VPN technology developed by Cisco Set up on two routers with public IP addrs To form a tunnel between them – Carrying private IP traffic over public Internet

GRE Example R1 has public IP address R2 has public IP address R1 has a private LAN /24 R2 has a private LAN /24

GRE Example We want to route traffic between the private LANs. We need a tunnel between them The GRE tunnel acts like a WAN link – Each end has an “interface” with an IP address – Just like a s0/0/0 with an IP address

GRE Configuration We need static routes on each router. Cannot advertise with a routing protocol R1(config)# ip route R2(config)# ip route Note: we use the private IP addresses in the static route