VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Outline What is it? Types. Security/Tunneling. Advantages and Disadvantages. Task 1 & Task 2
VPN: What is it? Virtual Private Network Remote network communication through Internet Used by companies/organizations who want to communicate confidentially Two parts: Protected or “inside” network “Outside” network or segment (less trustworthy)
VPN: Types Secure VPNs use cryptographic tunneling protocols. IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3, VPN-Q and MPVPN Trusted VPNs rely on the security of a single provider’s network to protect the traffic. MPLS and L2F
VPN: Security Encryption IPSec Authentication User/System and Data AAA Servers (Authentication, Authorization, and Accounting) Firewalls
VPN: Tunneling Requires 3 protocols Carrier Default network protocol Passenger Original data Encapsulation GRE, IPSec, L2F, PPTP, L2TP
VPN: Tunneling (cont.) Two Basic types of tunneling Site-to-Site Typically uses GRE Remote-Access Typically uses PPP
VPN: Advantages Cost Effective Greater scalability Easy to add/remove users Mobility Security
VPN: Disadvantages Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors
Task 1 Configure IPsec VPN Settings TIME: 20 minutes
Task 2 Verify Site-to-Site IPsec VPN Configuration TIME: 10 minutes