Download presentation
Presentation is loading. Please wait.
Published byBennett Pierce Modified over 9 years ago
1
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -1--1- outline What is a VPN? What is a VPN? Types of VPN Why use VPNs? Disadvantage of VPN Types of VPN protocols Encryption
2
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -2--2- What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and encryption to protect data integrity and confidentiality A VPN includes authentication and encryption to protect data integrity and confidentiality VPN Internet
3
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -3--3- Types of VPNs Remote Access VPN Remote Access VPN Provides access to internal corporate network over the Internet. Reduces long distance, modem bank, and technical support costs. Internet Corporate Site
4
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -4--4- Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN Connects multiple offices over Internet Reduces dependencies on frame relay and leased lines Internet Branch Office Corporate Site
5
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -5--5- Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN Extranet VPN Provides business partners access to critical information (leads, sales tools, etc) Reduces transaction and operational costs Corporate Site Internet Partner #1 Partner #2
6
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -6--6- Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN Extranet VPN Intranet VPN: Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Internet LAN clients Database Server LAN clients with sensitive data
7
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -7--7- Why Use Virtual Private Networks? More flexibility More flexibility Use multiple connection types (cable, DSL, T1, T3) Secure and low-cost way to link Ubiquitous ISP services Easier E-commerce
8
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -8--8- Why Use Virtual Private Networks? More flexibility More flexibility More scalability More scalability Add new sites, users quickly Scale bandwidth to meet demand
9
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -9--9- Why Use Virtual Private Networks? More flexibility More flexibility More scalability More scalability Lower costs Lower costs Reduced frame relay/leased line costs Reduced long distance Reduced equipment costs (modem banks,CSU/DSUs) Reduced technical training and support
10
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -10- VPN Return on Investment 5 branch offices, 1 large corporate office, 200 remote access users. Payback: 1.04 months. Annual Savings: 88% Check Point VPN Solution Non-VPN Solution Savings with Check Point Startup Costs (Hardware and Software) $51,965 Existing; sunk costs = $0 Site-to-Site Annual Cost $30,485$71,664 Frame relay $41,180 /yr RAS Annual Cost $48,000$604,800 Dial-in costs $556,800 /yr Combined Annual Cost $78,485$676,464 $597,980 /yr Case History – Professional Services Company
11
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -11- Disadvantages of VPN Lower bandwidth available compared to dial-in line Lower bandwidth available compared to dial-in line Inconsistent remote access performance due to changes in Internet connectivity Inconsistent remote access performance due to changes in Internet connectivity No entrance into the network if the Internet connection is broken No entrance into the network if the Internet connection is broken
12
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -12- Point-to-Point Tunneling Protocol (PPTP) Layer 2 remote access VPN distributed with Windows product family Layer 2 remote access VPN distributed with Windows product family Addition to Point-to-Point Protocol (PPP) Allows multiple Layer 3 Protocols Uses proprietary authentication and encryption (MPPE Uses proprietary authentication and encryption (MPPE ) Limited user management and scalability Limited user management and scalability Used MPPE encryption method Internet Remote PPTP Client ISP Remote Access Switch PPTP RAS Server Corporate Network
13
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -13- Layer 2 Tunneling Protocol (L2TP) Layer 2 remote access VPN protocol Layer 2 remote access VPN protocol Combines and extends PPTP and L2F (Cisco supported protocol) Weak authentication and encryption Addition to Point-to-Point Protocol (PPP) Must be combined with IPSec for enterprise-level security Internet Remote L2TP Client ISP L2TP Concentrator L2TP Server Corporate Network
14
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -14- Internet Protocol Security (IPSec) Layer 3 protocol for remote access, intranet, and extranet VPNs Layer 3 protocol for remote access, intranet, and extranet VPNs Internet standard for VPNs Provides flexible encryption and message authentication/integrity
15
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -15- Encryption Used to convert data to a secret code for transmission over an trusted network Used to convert data to a secret code for transmission over an trusted network Encryption Algorithm “The cow jumped over the moon” “4hsd4e3mjvd3sd a1d38esdf2w4d” Clear Text Encrypted Text
16
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -16- Symmetric Encryption Same key used to encrypt and decrypt message Same key used to encrypt and decrypt message Faster than asymmetric encryption Faster than asymmetric encryption Used by IPSec to encrypt actual message data Used by IPSec to encrypt actual message data Examples: DES, 3DES, RC5 Examples: DES, 3DES, RC5 Shared Secret Key Data Encryption Standard Rivest Cipher
17
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -17- Asymmetric Encryption Different keys used to encrypt and decrypt message (One public, one private) Different keys used to encrypt and decrypt message (One public, one private) Provides non-repudiation of message or message integrity Provides non-repudiation of message or message integrity Examples include RSA, DSA, SHA-1, MD-5 Examples include RSA, DSA, SHA-1, MD-5 Alice Public Key Encrypt Alice Private Key Decrypt BobAlice RivestRivest, Shamir and Adleman Digital Signature Algorithm Sha Hash Algorithm Message-Digest algorithm 5ShamirAdleman
18
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -18- Industries That May Use a VPN : enables the transferring of confidential patient information within the medical facilities & health care provider Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider : allow suppliers to view inventory & allow clients to purchase online safely Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely : able to securely transfer sales data or customer info between stores & the headquarters Retail: able to securely transfer sales data or customer info between stores & the headquarters : enables account information to be transferred safely within departments & branches Banking/Financial: enables account information to be transferred safely within departments & branches : communication between remote employees can be securely exchanged General Business: communication between remote employees can be securely exchanged
19
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM
20
www.BZUPAGES.COM
21
www.BZUPAGES.COM
22
www.BZUPAGES.COM
23
www.BZUPAGES.COM
24
www.BZUPAGES.COM
25
www.BZUPAGES.COM
26
www.BZUPAGES.COM
27
www.BZUPAGES.COM
28
www.BZUPAGES.COM
29
www.BZUPAGES.COM
30
www.BZUPAGES.COM
31
www.BZUPAGES.COM
32
www.BZUPAGES.COM
33
www.BZUPAGES.COM
34
www.BZUPAGES.COM
35
www.BZUPAGES.COM
36
www.BZUPAGES.COM -36- Thanks for your attention
37
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential www.BZUPAGES.COM -37- Resource: www.vpnc.org/vpn-technologies.pdf www.adtran.com/ www.cisco.com/ipsec_wp.htm www.computerworld.com www.findvpn.com www.wikipedia.org
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.