Virtual Private Networks

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
VIRTUAL PRIVATE NETWORKS (VPN)
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Virtual Private Network
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Network Access for Remote Networks
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Network (VPN)
Introduction to Computers
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
Virtual Private Networks
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks Done By: Noor Alhathal 200901002 Deena Jokhdar 200901528 Sara Alghamdi 200900137

Outline Introduction Definition of VPN’s Functions of VPN’s Types of VPN’s Advantages and disadvantages of VPN’s Security Mechanism used in VPN’s Conclusion and recommendation Summary References

Introduction Uses public telecommunication channels, such as the Internet or other network service, instead of leased lines channels. Described as Virtual because it is distant connection using private connections. Used to widely now because of today's globalization. Connects users or branches. Used to use dial-up or Leased communication, now using IP-VPN’s

Methodology We have conducted a library research Qualitative research information mainly based on secondary resources. gathered information from articles, books related to Virtual Private Networks.

What is a VPN? Virtual private network is a communication it is usually used in companies and organizations. it scrambles the connections between two computers so that only the sender and intended recipient know what is being sent. It is useful for customers who exchange sensitive data.

Functions of VPN Extend geographic connectivity. Improve security Reduce transfer time and transportation costs for remote users. Provide global networking opportunities. Provide home-worker support. Support remote access to an internet. Join networks between two organizations, forming an extranet.

Types of VPN’s: Access VPNs alternatives to ISDN and dial connections Asynchronous dials, ISDN, DSL, mobile IP, and the cable technologies are also supported. access connections offer much lower cost solution, as well as a wide range of connectivity options.

Security identifying the user as a member of the approved consumer company, and then setting up a private tunnel to its gateway, which holds the per-user authentication and authorization.

Intranet connections link business headquarters, remote and branch offices over shared communication alternative to leased line communication Intranet connections also provide the advantage of lower cost and extended connectivity to users

Connection Remote employees or mobile users will connect to a limited Point of Presence, or POP, to the Service Provider and access their company’s network.

Extranet VPNs link consumers, suppliers or partners of a corporate intranet through a joint communications using dedicated connections. as alternative to EDI of fax and has replaced old communication channels widely used in today’s world as the extranet assist the process of e-commerce communication and made it way much easier and faster.

The Advantages of the Virtual Private Network: Greater scalability Easy to add/remove users Reduced long-distance telecommunications costs Mobility Security

The Disadvantages of the Virtual Private Network: Lack of standards Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors

The security mechanism used in VPNs: For secure VPNs, the technologies that VPNC supports are: IPsec with encryption L2TP inside of IPsec SSL with encryption For trusted VPNs, the technologies that VPNC supports are: MPLS with constrained distribution of routing information through BGP ("layer 3 VPNs") Transport of layer 2 frames over MPLS ("layer 2 VPNs")

Conclusion In conclusion the VPNs let the users or companies to connect to remote servers over the public internet network, while maintaining protected telecommunications. The VPNs technology is designed to address concerns of the existing business trend toward improved telecommuting and broadly distributed international operations, where employees must be able to attach to central resources and communicate with each other.

Recommendations VPN can have some limitations such : as the clients hit the network stack or may not play well with personal firewalls or other software or even may not need full access to the target network just encrypted access. So we recommend: VPN users to use SSL as the main transport protocol to an appliance. Users can add NT authentication to the appliance. Or, Clientless mode: Use web enabled applications over the Internet, the appliance SSLifies web sites.

Summary Definition of VPN’s Functions of VPN’s Types of VPN’s Advantages and disadvantages of VPN’s Security Mechanism used in VPN’s

References jeff , T. (2009). How virtual private networks work. Retrieved from http://www.communicat.com.au/downloads/factsheets/how_vpn_work.pdf james, F. (2000). Multi-access virtual private network.6061796 (May 9, 2000), Retrieved from http://www.google.com/scholar What is VPN (virtual private networking)?. (2008, 8 12). Retrieved from http://kb.netgear.com/app/answers/detail/a_id/1128/~/what-is-vpn-(virtual-private-networking) mitchell, B. (n.d.). Vpn - virtual private network. Retrieved from

Thank you any questions!