©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -1--1- outline What is a VPN? What is a VPN?  Types of VPN.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Virtual Private Networks (VPN)
Virtual Private Networks
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
VPN: Virtual Private Network
Virtual Private Network
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN  Why use VPNs?  Disadvantage of VPN  Types of VPN protocols  Encryption

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and encryption to protect data integrity and confidentiality A VPN includes authentication and encryption to protect data integrity and confidentiality VPN Internet

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Types of VPNs Remote Access VPN Remote Access VPN  Provides access to internal corporate network over the Internet.  Reduces long distance, modem bank, and technical support costs. Internet Corporate Site

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN  Connects multiple offices over Internet  Reduces dependencies on frame relay and leased lines Internet Branch Office Corporate Site

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN  Extranet VPN  Provides business partners access to critical information (leads, sales tools, etc)  Reduces transaction and operational costs Corporate Site Internet Partner #1 Partner #2

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN  Extranet VPN  Intranet VPN: Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Internet LAN clients Database Server LAN clients with sensitive data

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Why Use Virtual Private Networks? More flexibility More flexibility  Use multiple connection types (cable, DSL, T1, T3)  Secure and low-cost way to link  Ubiquitous ISP services  Easier E-commerce

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Why Use Virtual Private Networks? More flexibility More flexibility More scalability More scalability  Add new sites, users quickly  Scale bandwidth to meet demand

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Why Use Virtual Private Networks? More flexibility More flexibility More scalability More scalability Lower costs Lower costs  Reduced frame relay/leased line costs  Reduced long distance  Reduced equipment costs (modem banks,CSU/DSUs)  Reduced technical training and support

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential VPN Return on Investment 5 branch offices, 1 large corporate office, 200 remote access users. Payback: 1.04 months. Annual Savings: 88% Check Point VPN Solution Non-VPN Solution Savings with Check Point Startup Costs (Hardware and Software) $51,965 Existing; sunk costs = $0 Site-to-Site Annual Cost $30,485$71,664 Frame relay $41,180 /yr RAS Annual Cost $48,000$604,800 Dial-in costs $556,800 /yr Combined Annual Cost $78,485$676,464 $597,980 /yr Case History – Professional Services Company

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Disadvantages of VPN Lower bandwidth available compared to dial-in line Lower bandwidth available compared to dial-in line Inconsistent remote access performance due to changes in Internet connectivity Inconsistent remote access performance due to changes in Internet connectivity No entrance into the network if the Internet connection is broken No entrance into the network if the Internet connection is broken

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Point-to-Point Tunneling Protocol (PPTP) Layer 2 remote access VPN distributed with Windows product family Layer 2 remote access VPN distributed with Windows product family  Addition to Point-to-Point Protocol (PPP)  Allows multiple Layer 3 Protocols Uses proprietary authentication and encryption (MPPE Uses proprietary authentication and encryption (MPPE ) Limited user management and scalability Limited user management and scalability  Used MPPE encryption method Internet Remote PPTP Client ISP Remote Access Switch PPTP RAS Server Corporate Network

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Layer 2 Tunneling Protocol (L2TP) Layer 2 remote access VPN protocol Layer 2 remote access VPN protocol  Combines and extends PPTP and L2F (Cisco supported protocol)  Weak authentication and encryption  Addition to Point-to-Point Protocol (PPP)  Must be combined with IPSec for enterprise-level security Internet Remote L2TP Client ISP L2TP Concentrator L2TP Server Corporate Network

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Internet Protocol Security (IPSec) Layer 3 protocol for remote access, intranet, and extranet VPNs Layer 3 protocol for remote access, intranet, and extranet VPNs  Internet standard for VPNs  Provides flexible encryption and message authentication/integrity

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Encryption Used to convert data to a secret code for transmission over an trusted network Used to convert data to a secret code for transmission over an trusted network Encryption Algorithm “The cow jumped over the moon” “4hsd4e3mjvd3sd a1d38esdf2w4d” Clear Text Encrypted Text

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Symmetric Encryption Same key used to encrypt and decrypt message Same key used to encrypt and decrypt message Faster than asymmetric encryption Faster than asymmetric encryption Used by IPSec to encrypt actual message data Used by IPSec to encrypt actual message data Examples: DES, 3DES, RC5 Examples: DES, 3DES, RC5 Shared Secret Key Data Encryption Standard Rivest Cipher

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Asymmetric Encryption Different keys used to encrypt and decrypt message (One public, one private) Different keys used to encrypt and decrypt message (One public, one private) Provides non-repudiation of message or message integrity Provides non-repudiation of message or message integrity Examples include RSA, DSA, SHA-1, MD-5 Examples include RSA, DSA, SHA-1, MD-5 Alice Public Key Encrypt Alice Private Key Decrypt BobAlice RivestRivest, Shamir and Adleman Digital Signature Algorithm Sha Hash Algorithm Message-Digest algorithm 5ShamirAdleman

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Industries That May Use a VPN  : enables the transferring of confidential patient information within the medical facilities & health care provider  Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider  : allow suppliers to view inventory & allow clients to purchase online safely  Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely  : able to securely transfer sales data or customer info between stores & the headquarters  Retail: able to securely transfer sales data or customer info between stores & the headquarters  : enables account information to be transferred safely within departments & branches  Banking/Financial: enables account information to be transferred safely within departments & branches  : communication between remote employees can be securely exchanged  General Business: communication between remote employees can be securely exchanged

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential

Thanks for your attention

©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential Resource: