Presentation is loading. Please wait.

Presentation is loading. Please wait.

Virtual Private Network Security Name: Yanhong Huang ID# 106627 Course: COSC513 Date: 12/16/00.

Similar presentations


Presentation on theme: "Virtual Private Network Security Name: Yanhong Huang ID# 106627 Course: COSC513 Date: 12/16/00."— Presentation transcript:

1 Virtual Private Network Security Name: Yanhong Huang ID# 106627 Course: COSC513 Date: 12/16/00

2 Outline zWhat is VPN zHow to connect with VPN zSecurity of VPN zInternet protocol Security(IPSec) zThree types of Authentication zSummary

3 What is VPN xIs a private communication channel on a public network. xUsing hardware or software to extend the company intranet and create an extranet xHaving three basic elements: company intranet, internet and dial-in segment from user xUsing tunneling technology by which packages network communication packets inside another network packet.

4 Connecting With VPN xMake a connection to an ISP using local-access number xCreate a second connection to your corporate network, which makes the tunnel that goes through the Internet and to your corporate network. xEnter your login name and password

5 Security of VPN x.Public-key infrastructure (PKI) cryptography x ---a pair of keys (public, private) x.Secure protocols x (1) Secure Sockets Layer (SSL), x (2) Transport Layer Security (TLS)  (3) Tunneling Protocols  (a) Point-to-Point Tunneling Protocol(PPTP)  (b) Internet Protocol Security (IPSec)

6 IP security(IPSec) zIs the modern basis for VPN zOperates at a lower level than the SSL and TLS protocol zSecures an entire network by encrypting the Internet Protocol (IP) network packets zUses Security Associations (SAs) to track all this cryptographic information. zEach SA pair is associated with the security gateways(router and firewall)

7 IP security(IPSec) xEach IPSec encapsulated datagram contains a section called the IPSec header which contains the SA destination address and other security information. xIPSec can operate in either a transport mode (using for the same location) or tunnel mode(using for different location)

8

9 Three types of Authentication x.Message authentication insures the integrity of the messages that arrive at the end of the VPN tunnel. x.Client authentication insures that the software and equipment attached to the VPN are authorized x.User authentication insures that only authorized users can connect to the resources at the other end of the VPN tunnel.

10 Summary zSecure to transfer data between customer and Company intranet zUsing tunneling protocol zSaving long-distance call or leased line fee


Download ppt "Virtual Private Network Security Name: Yanhong Huang ID# 106627 Course: COSC513 Date: 12/16/00."

Similar presentations


Ads by Google