Presentation is loading. Please wait.

Presentation is loading. Please wait.

Virtual Private Networks Ba 378 Winter 2006. What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer.

Similar presentations


Presentation on theme: "Virtual Private Networks Ba 378 Winter 2006. What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer."— Presentation transcript:

1 Virtual Private Networks Ba 378 Winter 2006

2 What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer mechanism. It also attempts to maintain security during transfer of information The most common configuration is to have a single main internal network with remote nodes using VPN to gain full access to the central net. The remote nodes are commonly remote offices or employees working from home. You can also link two small (or large) networks to form an even larger single network. http://www.tldp.org/HOWTO/VPN-HOWTO/x192.html

3 VPNs as islands VPNs work like islands The ocean can be seen as the internet To get to each island a bridge must be built, even though it may be costly at first hand. It is beneficial in the end. (Leased Lines) Submarines are given to each person who attain a leased line. Each remote member can communicate in a safe and reliable manner. http://www.alliancedatacom.com/how-vpn-works.asp

4 TYPES OF VPN’S  Remote Access VPN  Site to Site VPN - Intranet VPN - Extranet VPN 2 Common Types

5 Remote Access VPN “Virtual Private dial-up network” User to LAN connection Enables employees to connect to private network from remote locations What is it? http://computer.howstuffworks.com/vpn2.htm

6 Remote Access VPN Company out sources to an enterprise service provider (ESP) ESP sets up a network access server (NAS) Telecommuters receive desktop client software for computer Employees dial toll free number on computer to connect to NAS and use client software to tap into company network How does it work? http://computer.howstuffworks.com/vpn2.htm

7 Site to Site VPN  Intranet-based - One or more remote locations connect to a single private network -Connects LAN to LAN  Extranet-based -Close relationship with another company -Connects LAN to LAN -Various companies can work in shared environment What is it and How does it work? http://computer.howstuffworks.com/vpn3.htm

8 3 VPN TYPES http://computer.howstuffworks.com/vpn2.htm

9 VPN Security With VPN now expanding not only through businesses but through out the globe and connecting several businesses together through LANs, WANs, and Wireless networks, security is more important than ever

10 Integrated Security Systems An integrated system provides greater risk reduction than any individual product or combination security devices, regardless of features or performance. Using the network to provide a common security architecture: reduces complexity enables tighter integration closes risk gaps provides greater visibility of end-to-end security http://www.cisco.com/en/US/products/hw/vpndevc/products_category_technologies_overview.html

11 Well designed VPNs incorporate the following characteristics: Integrated: Every element of the network acts as a point of defense including software and hardware Collaborative: Various network components work together to provide a means of protection. Security involves cooperation between endpoints, network elements, and policy enforcement Adaptive: The system can recognize new threats as the arrive. Mutual awareness can exist among and between security services and network intelligence, thus increasing security effectiveness to new threats. http://www.cisco.com/en/US/products/hw/vpndevc/products_category_technologies_overview.html

12 VPN Security Methods A well designed VPN uses several methods for keeping the connection and data secure, these are some of them: Firewalls Encryption IPSec AAA Servers http://computer.howstuffworks.com/vpn.htm

13 Firewall “A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.” http://computer.howstuffworks.com/vpn.htm

14 Firewall Firewalls are an important part of the security system because they will help stop hackers, viruses, spyware, and other harmful things that are associated with the internet from entering the company’s computer system. http://computer.howstuffworks.com/vpn.htm

15 Encryption “Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode.” Most computer systems use one of the following: Symmetric-key encryption Public-key encryption http://computer.howstuffworks.com/vpn.htm

16 Symmetric-key encryption Each computer has a secret key that it can use to encrypt information before it is sent over the network to another computer Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message. http://computer.howstuffworks.com/vpn.htm

17 Example “You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.” http://computer.howstuffworks.com/vpn.htm

18 Public-key encryption This encryption uses a combination of a private key and a public key The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key http://computer.howstuffworks.com/vpn.htm

19 Public-key encryption The most popular public-key encryption is called Pretty Good Privacy (PGP) This program lets you encrypt just about anything. ie email, hard drives, media, etc. For more information PGPPGP http://computer.howstuffworks.com/vpn.htm

20 IPSec IPSec stands for Internet Protocol Security Protocol It provides enhanced security features such as better encryption algorithms and more comprehensive authentication There are two types of encryption: tunneling and transport http://computer.howstuffworks.com/vpn.htm

21 Tunneling and transporting Tunneling encryption encrypts each packet that is sent Transport encryption encrypts the entire package as a whole that is sent http://computer.howstuffworks.com/vpn.htm

22 Photo courtesy Cisco Systems, Inc. A remote-access VPN utilizing IPSec http://computer.howstuffworks.com/vpn.htm Overview of a VPN and its security points

23 AAA Servers AAA stands for authentication, authorization and accounting These servers are used for a more secure access for remote-access VPN environments http://computer.howstuffworks.com/vpn.htm

24 AAA Servers When a AAA server gets a request to establish a session, it asks the following questions: Who you are (authentication)? What you are allowed to do (authorization)? What you actually do (accounting)? http://computer.howstuffworks.com/vpn.htm

25 Who uses VPNs? Companies and organizations –Employees work at home or traveling Retail sector –Usually have multiple sites Universities –Allow students and faculty to access information off site

26 Providers of VPNs Company can build own –Purchase software –Use of a router Can outsource –Mostly internet service providers (ISPs) and interexchange carriers (IXCs) –Less managing and logistics involved http://compnetworking.about.com/gi/dynamic/offsite.htm?site=http%3A%2F%2Fwww.informationweek.com%2F780% 2Fvpn.htm http://www.techsoup.org/howto/articles/networks/page1352.cfm?cg=searchterms&sg=Virtual%20Private%20Network

27 How much does VPNs cost? Prices vary by each provider Additional options available such as network management, user authentication, firewalls, encryption Savings – Infonetics reports $1,000 average savings per remote worker per year –Cisco’s study states savings of $600 to $1,800 per remote worker per year. http://www.bcr.com/architecture/remote_access/do-it-yourself_vpns_20020519302.htm

28 Pros and Cons of VPNs Price Vs. Added-Value Added-Value –Efficiency –Security –Geographic Distance –Satisfaction Poor Maintenance

29 Components of a good VPN A Good VPN Should… Security It must offer security to the users while accessing their data. Maintenance It should be updated and maintained within the means of the company. Efficiency The VPN needs to add to the productivity and quality of the company. Reliability It should be a network that can be counted-on. Price The benefits must outweigh the costs of the VPN. Breadth It should span far enough to meet the needs of the company. Alignment The VPN must enhance and compliment the goals of the company.


Download ppt "Virtual Private Networks Ba 378 Winter 2006. What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer."

Similar presentations


Ads by Google