Virtual Private Network Technology Nikki London COSC 352 March 2, 2010
Virtual Private Network VPN Private WAN Logically connected by the Internet Connects remote sites and users Tunnel Secure virtual connection Between two nodes
Advantages Cost Security Extends network resources Customize clients access right and privileges Accommodates to the clients Bandwidth Distance
Disadvantages Installation and configuration can be difficult Internet-based VPN relies on an ISP Mixing equipment from different vendors can cause technical problems Cost associated with an outsourced VPN from ISP
Uses Extend Network resources Extension can go Global Can also go for only a short distance All guarantee security Added Security Secure a Wireless Office A public network being used privately
Tunneling Protocols Tunneling Encapsulates higher level protocols in Layer 2 Protocols PPTP (Point-to-Point Tunneling Protocols) L2TP (Layer 2 Tunneling Protocols)
PPTP Developed by Microsoft Supports Encryption Authentication Access Services
L2TP Based on Cisco's L2F Compatible with multiple venders Connects Routers Clients Servers End points do not have to be on same network
Types of VPNs Remote-Access Site-to-Site Intranet Extranet
Remote-Access VPN Connect to ISP Connect to Remote Access Server Telecommute PPTP- Most popular with Windows users
Site-to-Site VPN Connects Remote Locations Branch Offices Home Offices Business Partners
Security Authentication Encryption Protocols IPSec (Internet Protocol Security) SSL (Secure Socket Layer)
Software VPN Client Software RRAS (Routing and Remote Access Service) Microsoft
Hardware VPN Servers VPN Routers VPN Concentrator Authenticates Clients Establishes Tunnels
Summary The biggest advantage is cost Connects remote locations Tunneling Protocols adds security A VPN can created by software or hardware and software