VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
Internet Protocol Security (IPSec)
Remote Networking Architectures
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
From circuit to packet switching
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Nine 1 Business Data Communications Chapter Nine Enterprise Solutions.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
Introduction to WAN Technologies
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Module 10: Providing Secure Access to Remote Offices.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Section #7: Getting Data from Point A to Point B.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks (VPN)
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Chapter 1: WAN Concepts Connecting Networks
Virtual Private Network (VPN)
The Business Value of MPLS VPNs
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

VPN

What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the Internet Without requiring a dedicated Line Without requiring a dedicated Line Also known as private networks between sites Also known as private networks between sites

VPN-Remote Access, and Interoffice Connections Rational for VPN Between Offices Rational for VPN Between Offices Productivity Away from the Office Productivity Away from the Office VPN Technology VPN Technology

Between Offices Shared circuits within the carrier networks Shared circuits within the carrier networks Adding capacity to a VPN is: Adding capacity to a VPN is: –Simpler than adding a high-speed –Customer needs only high-speed from its building to the carrier’s network

Productivity Away from the Office Overcomes dial up costs and slowness Overcomes dial up costs and slowness Access via a browser to corporate data bases is the same Access via a browser to corporate data bases is the same –at home or –in the office

Newer VPN Technology VPN Site-to-Site VPN Site-to-Site –MPLS –IP VPNs Secure Access on VPNs for Remote Access Secure Access on VPNs for Remote Access –IPSec (Internet protocol security) –SSL (Secure socket layer) security

Secure Access on VPNs for Remote Access –IPSec (Internet protocol security) - requires client software on computers Established a secure, encrypted link to a security device at the carrier or the enterprise. Established a secure, encrypted link to a security device at the carrier or the enterprise. –THIS IS TUNNELING –SSL (Secure socket layer) security – is a newer VPN method. Access is embedded in browsers so the organizations are not required to install special client software in each users computer. Access is embedded in browsers so the organizations are not required to install special client software in each users computer.

Rational for VPN Between Offices Employees Employees Branch Offices Branch Offices Business Partners Business Partners

MPLS (Multiprotocol Label Switching) –VPNs Everyone-to-Everyone Link –Classes of Service –Prioritize Particular Traffic –Electronic Tags on MPLS packets –Service Components

VPNs Everyone-to-Everyone Link Customer provides to SP Customer provides to SP –A list of IP addresses for each site in the VPN Carrier uses the list to define a closed group of users allowed to communicate with each other Carrier uses the list to define a closed group of users allowed to communicate with each other

Classes of Service –Prioritize Particular Traffic Customer chooses 4-5 classes of service Customer chooses 4-5 classes of service –Used to define priority –Data, voice, video (low class  high)

Electronic Tags on MPLS packets MPLS attached tags to packets MPLS attached tags to packets Router reads tags and sets priority Router reads tags and sets priority Bypass the routing table lookup Bypass the routing table lookup Good VoIP feature Good VoIP feature

Service Components T1 typical to carrier T1 typical to carrier Separate access lines Separate access lines –MPLS (trusted sources) –Internet (high levels of security)

VPNs Everyone-to-Everyone Link Mess service Mess service MPLS VPN traffic is carried separately from public internet traffic to guarantee levels of service. MPLS VPN traffic is carried separately from public internet traffic to guarantee levels of service. IP VPNs – site-to-site using the public Internet with IPSec IP VPNs – site-to-site using the public Internet with IPSec IPSec creates a tunnel for each packet IPSec creates a tunnel for each packet Tunnel hides the destination IP address Tunnel hides the destination IP address Scrambles data by encrypting it Scrambles data by encrypting it

VPNs for International Connectivity IPSec VPNs – Public internet-Based VPNs for Intersite Connections IPSec VPNs – Public internet-Based VPNs for Intersite Connections Network-Based IPSec VPNs – over carrier private IP Networks Network-Based IPSec VPNs – over carrier private IP Networks

IPSec VPNs – Public internet-Based VPNs for Intersite Connections The VPN provider manages the intercountry portion of the network The VPN provider manages the intercountry portion of the network Carrier’s POP refers to the site where its equipment resides Carrier’s POP refers to the site where its equipment resides NTT, BT, AT&T, Infonet, MCI, Sprint, Equant all offer intercontinental service. NTT, BT, AT&T, Infonet, MCI, Sprint, Equant all offer intercontinental service.

The End