SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Remote Desktop Connection Techniques Wireless Communication Networks.
TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
VPN Virtual Private Networks
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Networks (VPN)
CIT 480: Securing Computer Systems
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH

CONTENTS  INRODUCTION  VPN BASIC ARCHITECTURE  VPN ENCAPSULATION OF PACKETS  PROTOCOLS USED IN VPN  TYPES OF IMPLEMENTATIONS  VPN TUNNELING  VPN SECURITY  ADVANTAGES  DIS ADVANTAGES

INTRODUCTION  What is a VPN?  Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  In a virtual private network (VPN), "virtual" implies that there is no physical network infrastructure dedicated to the private network. Instead, a single physical network infrastructure is shared among various logical networks.

INTRODUCTION  Why VPNs?  Separate private networking solutions are expensive and cannot be updated quickly to adapt to changes in business requirements.  The Internet is inexpensive but does not by itself ensure privacy.  Who uses VPNs?  VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available.  VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet.

INTRODUCTION  Four Critical Functions of VPN:  Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered.

VPN BASIC ARCHITECTURE

VPN ENCAPSULATION OF PACKETS

PROTOCOLS USED IN VPN  PPTP - Point-to-Point Tunneling Protocol  L2TP - Layer 2 Tunneling Protocol  IPsec - Internet Protocol Security  SOCKS – Is not used very frequently

TYPES OF IMPLEMENTATIONS  Remote-Access VPN  Site-to-Site VPN (Intranet-based)  Site-to-Site VPN (Extranet-based)

REMOTE-ACCESS VPN

 Remote-access, also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.  A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field.  Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider.

APPLICATIONS : REMOTE-ACCESS VPN  Encrypted connections between mobile or remote users and their corporate networks  Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server.  Ideal for a telecommuter or mobile sales people.  VPN allows mobile workers & telecommuters to take advantage of broadband connectivity i.e. DSL, Cable.

SITE-TO-SITE VPN (INTRANET-BASED)

 If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.

SITE-TO-SITE VPN (EXTRANET-BASED)

 When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.

APPLICATIONS : SITE-TO-SITE VPN  Large-scale encryption between multiple fixed sites such as remote offices and central offices.  Network traffic is sent over the branch office Internet connection.  This saves the company hardware and management expenses.

VPN TUNNELING

TUNNELING  Most VPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network.  Tunneling requires three different protocols:  Passenger protocol - The original data (IPX, IP) being carried  Encapsulating protocol - The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data  Carrier protocol - The protocol used by the network that the information is traveling over

VPN SECURITY  A well-designed VPN uses several methods for keeping the connection and data secure:  Firewalls  Encryption  IPSec  AAA Server  You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.

VPN : ADVANTAGES  Greater Scalability  Mobility  Security  Easy to add/remove users  Reduced long-distance telecommunications cost

VPN : DIS ADVANTAGES  Unpredictable Internet traffic  Lack of standards  Understanding of security issues  Difficult to accommodate products from different vendors

REFERENCES 

THANK YOU !