Virtual Private Networks

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
IP Security
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
Virtual Private Networks and IPSec
IPSec Detailed Description and VPN
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
CSE 4905 IPsec.
Virtual Private Networks
Internet and Intranet Fundamentals
VPN: Virtual Private Network
Virtual Private Networks (VPN)
IPSec VPN Chapter 13 of Malik.
CIT 480: Securing Computer Systems
Virtual Private Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Security Protocols in the Internet
VPN: Virtual Private Network
Introduction to Network Security
Virtual Private Networks (VPNs)
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks By: Jacob Anderson

What is a Virtual Private network? A secure network connection on top of a wider network Hence virtual Uses a larger network, like the internet, to connect a remote site and users together Taking advantage of availability Mimics a physical network Convenient accessibility Better alternative to a leased line

leased lines Pay a provider for a “symmetric telecommunications” line Monthly price Each side of the cable is permanently connected No telephone number Advantage in speed Normally fiber optic Dedicated Most of the time infeasible

VPN vs. SSH SSH works at the application layer Port specific SSH establishes connections on a one-to-one basis A single client to a server or another single entity A VPN can connect a user to a whole network Great for business off-site extension A VPN is not limited to single-port connections Network layer connectivity

VPN with SSH In some cases, security may be necessary within the local network as well Confidential data that only some employees are eligible to view VPN handles the security over the internet Encapsulates SSH protocol packet SSH, then, provides application to application security within Only sending and receiving employees will be able to view

How a VPN works An IP packet is wrapped in an extra layer Which provides security The extra layer is processed by a router Not at a higher level in the OSI protocol stack

VPN Router VPN is accomplished using a specific type of router and/or VPN software Designed to handle the IP layer security protocol Cost for a small business VPN router is between 150 to 400 dollars This one is $150

VPN Protocols PPTP L2TP L2F IPSEC Most commonly used

IPSEC Consists of two main protocol sets: Authentication Header (AH) Encapsulating Security Payload (ESP)

Authentication Header Known as “Tunnel Mode” Replay bit Triggered when viewed (Know whether compromised) Process: 1) IP header and data payload is hashed 2) Hash is used to build a new header, which is appended 3) New packet is transmitted to the VPN router 4) The receiving router hashes the IP header and data payload as well, and the result must match the previously appended hash (the authentication header)

AH Diagram

Encapsulating Security Payload (ESP) Known as “Transport Mode” Provides source authentication, integrity, an anti-replay service, and limited traffic flow confidentiality Encryption of the IP Packet Layer is performed Standard is 56-bit DES But others can be used

ESP Diagram

When to use each mode Between IPSec Gateways End station to IPSec Gateway IPSec router to server End station to end station

Advantages of VPN Cost Security Scalability Increase infrastructure without physical addition Compatibility with broadband Multi-point communication Business communication links LAN to LAN Mobile workers access to LAN Off-site remote work more possible

References http://en.wikipedia.org/wiki/Virtual_private_netw ork http://computer.howstuffworks.com/vpn7.htm http://www.schumi.ch/partner/SSHvsVPN.htm http://www.ciscopress.com/articles/article.asp?p= 24833&seqNum=3 http://cba.unomaha.edu/faculty/garfathr/web/vpn _pros_cons.html