Presentation is loading. Please wait.

Presentation is loading. Please wait.

VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.

Similar presentations


Presentation on theme: "VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually."— Presentation transcript:

1 VPN’s Kristin Belanger

2 VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually set up through internet Pass secure information through a tunnel on the internet Pass secure information through a tunnel on the internet Cost savings Cost savings

3 Benefits Improved productivity Improved productivity Global network opportunities Global network opportunities Telecommuter support Telecommuter support

4 Types of VPN’s Remote Access VPN Remote Access VPN Extranet VPN Extranet VPN Intranet VPN Intranet VPN

5 Remote Access User-to-LAN connection User-to-LAN connection Some need ESP (Enterprise Service Provider Some need ESP (Enterprise Service Provider Sets up a Network Access Server Sets up a Network Access Server Users have desktop client software Users have desktop client software

6 Site-to-Site Two types: Intranet and Extranet Two types: Intranet and Extranet Intranet: Can connect a LAN to a LAN Intranet: Can connect a LAN to a LAN Extranet: with another company Extranet: with another company

7 Safe and Secure Recommended hardware: Recommended hardware: Firewall Firewall Encryption Encryption IPSec IPSec AAA server AAA server

8 IPSec Internet Protocol Security Protocol Internet Protocol Security Protocol Aids in encryption Aids in encryption Enhance algorithms Enhance algorithms Two types: tunnel and transport Two types: tunnel and transport Tunnel: encrypts header and payload Tunnel: encrypts header and payload Transport: payload Transport: payload

9 AAA Server Authentication, authorization, accounting Authentication, authorization, accounting Secure for remote-access VPN environments Secure for remote-access VPN environments Help with auditing, billing, reports Help with auditing, billing, reports

10 Software Desktop client software Desktop client software Dedicated hardware (VPN concentrator, PIX firewall) Dedicated hardware (VPN concentrator, PIX firewall) Dedicated VPN server for dial up Dedicated VPN server for dial up NAS server NAS server VPN network and policy-management center VPN network and policy-management center No protocol No protocol

11 Tunneling Protocol Carrier protocol Carrier protocol Network tunnel is established on Network tunnel is established on Encapsulation protocol Encapsulation protocol Packet that wraps itself around the original data Packet that wraps itself around the original data Passenger protocol Passenger protocol The original data itself The original data itself

12 NMMC VPN’s for select physicians VPN’s for select physicians VPN’s for employees VPN’s for employees VPN’s for other offices VPN’s for other offices

13 Problem with VPN Only one computer can be connected through the VPN at one time Only one computer can be connected through the VPN at one time Can’t have two computers on one Internet connection trying to create tunnel Can’t have two computers on one Internet connection trying to create tunnel Need two different internet lines in order to make tunnel work all of the time Need two different internet lines in order to make tunnel work all of the time

14 Questions?


Download ppt "VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually."

Similar presentations


Ads by Google