Virtual Private Networks

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Protocol Security (IPSec)
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Networks Warren Toomey. Available WAN Links.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Module 10: Providing Secure Access to Remote Offices.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
An Analysis on NAT Security
Virtual Private Networks
Virtual Private Network Access for Remote Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
IPSec Detailed Description and VPN
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Visit for more Learning Resources
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
SECURING NETWORK TRAFFIC WITH IPSEC
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPN)
Understand Networking Services
Chapter 7 Backbone Network
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Firewalls Routers, Switches, Hubs VPNs
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Virtual Private Networks
Introduction to Network Security
Unit 8 Network Security.
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks What is a VPN? Data Security IPsec Quality of Service for VPNs A Major Breakthrough for VPNs

What Is A VPN? A VPN (Virtual Private Network) is a private connection between two or more machines that sends private data traffic over a shared or public network. This technology enables organizations to extend their network to branch offices and remote users by creating a private WAN via the Internet.

Data Security And QoS Because VPNs rely on the public Internet as a delivery mechanism, network managers must address two key issues: data security and Quality of Service (QoS). It has been stated that resolving these two issues together has been like trying to mix oil and water.

VPNs And The Data Security Issue Security is a huge concern on VPNs because enterprise data must regularly pass through the public Internet, where data can easily be intercepted and potentially misused. To secure enterprise data, VPNs rely on data encryption. Encryption protocols are used to encode data prior to delivery across the VPN, and to decode the data at the receiving end.

VPNs And The Data Security Issue (cont’d) The most commonly used standard for secure Internet communications is Internet Protocol Security (IPSec). IPsec is a developing standard for security at the network or packet processing layer of network communication. Through widespread adoption of the IPSec standard, and the growing prevalence of desktop-based encryption, the issue of data security on VPNs has largely been solved.

IPsec (Internet Protocol Security) IPsec provides two choices of security service: Authentication Header, which essentially allows authentication of the sender of data, and Encapsulating Security Payload, which supports both authentication of the sender and encryption of data as well. The specific information associated with each of these services is inserted into the packet in a header that follows the IP packet header.

Quality Of Service For VPNs The next challenge facing VPN managers is Quality of Service (QoS). Managers have turned to QoS solutions in an attempt to solve this dilemma, starting with traditional hardware devices.

Traditional QoS Solutions for VPNs The biggest drawback to traditional QoS is its inability to prioritize encrypted packets, making it virtually unusable in VPN environments. Traditional QoS relies on the use of individual IP packet fields to differentiate and prioritize packets. IPSec and other encryption technologies protect data by making most of the IP packet fields unreadable.

A Major Breakthrough For VPNs By controlling traffic at the application level, prior to IPSec packet encryption, Centerwise, a client-side approach software packaged developed by Centricity Software, completely avoids the issue of having to prioritize encrypted packets. Instead of looking at individual packets, Centerwise controls the flow of applications at the desktop, where traffic originates.

A Major Breakthrough For VPNs (cont’d) Centerwise Agents running at the desktop interact with applications directly, providing virtual session-layer control and ensuring the proper allocation of resources to users and applications. To determine the resource allocations for each traffic flow, Agents rely on policy instructions from the Centerwise Control Point (CP).

A Major Breakthrough For VPNs (cont’d) The CP works dynamically and automatically-24/7-to provide a smooth, even distribution of resources, and allows network managers to easily establish higher priorities for key users and applications.

Conclusion The appeal of a VPN is the global presence of the Internet. Communication links can be made quickly, cheaply, and safely across the world. With Centerwise, VPN managers no longer need to worry about how to prioritize encrypted traffic at a router or appliance. Traffic is prioritized at the desktop before it reaches the network layer and IPSec encryption, and applications are then ready for secure and reliable delivery across the VPN.

Centerwise Centerwise is a client-side approach software package designed to bolster application performance and lighten the load of network managers by moving bandwidth management from the network to the desktop. Centerwise runs on Windows 95, 98, NT and 2000 machines. It can support up to 20,000 end users, with upgrades. Branch office editions start at $5,000, and enterprise editions from $25,000.