Virtual Private Networks

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Defining Network Infrastructure and Security
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
K. Salah1 Security Protocols in the Internet IPSec.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Virtual Private Networks (VPN)
VPN: Virtual Private Network
Virtual Private Networks (VPN)
IPSec VPN Chapter 13 of Malik.
CIT 480: Securing Computer Systems
Virtual Private Networks
Examining Network Protocols
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Security Protocols in the Internet
VPN: Virtual Private Network
Cisco networking CNET-448
Virtual Private Network
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Chapter 8 – Data switching and routing
Presentation transcript:

Virtual Private Networks

Why VPN Fast, secure and reliable communication between remote locations Use leased lines to maintain a WAN. Disadvantages High Cost No flexibility

What is VPN Virtual Private Network is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated connection such as leased line, a VPN uses “virtual” connections routed though the internet.

VPN Types Remote-access single remote network device to intranet Site-to-site connect multiple fixed sites over a public network Intranet -based Extranet-based

VPN Technologies Tunneling Authentication Identity verification of network system. Access Control When an access request is presented, resource makes a decision to allow the access request to proceed or not. Performed at tunnel endpoints.

  Tunneling   Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network. A C D E F G H I B Tunnel

Original IP Header Payload New IP Header Original IP Header Payload

VPN Tunneling Protocols Layer 2 tunneling protocols A link layer frame is placed into the payload of a protocol data unit(PDU) from some other layer, including another layer 2 frame. Tunnel PPP frames through an IP network. Point-to-Point Tunneling Protocol (PPTP),Layer 2 Forwarding protocol (L2F), Layer 2 Tunneling Protocol (L2TP).

VPN Tunneling Protocols Layer 3 tunneling protocols A layer 3 frame is placed into the payload of a protocol data unit(PDU) from some other layer,or another layer 3 packet. VPNs within an IP network IPsec Label switching protocol Label is placed between layer 2 and layer 3 header. MPLS

Layer 2 tunneling protocol Tunnel PPP frames through the internet to the home network. Tunneling protocol Access concentrator(Client part) Network Server(server part)

PPTP PPP access by remote computers to a private network through the Internet 1. Remote user dials in to the local ISP network access server using PPP.

PPTP 2. The PAC establishes a control channel (TCP) across the PPP connection and through the internet to the PNS attached to the home network.

PPTP 3. Parameters for the PPTP channel are negotiated over the control channel, and the PPTP tunnel is established.

PPTP 4. A second PPP connection is made from the remote user, through the PPTP tunnel between the PAC and the PNS, and into the private networks NAS.

PPTP 5. IP datagrams or any other protocol’s datagrams are sent inside the PPP frames

L2F Tunnel is constructed from the service provider. Remote user dials in to the local ISP network access server using PPP/SLIP.

L2F 2. L2F builds a tunnel from the NAS to the private network. Uses packet-oriented protocol that provides end-to-end connectivity, such as UDP, frame relay, etc. as the encapsulating protocol.

L2F 3. L2F establishes PPP connection between NAS and home gateway.

L2F 4. IP packets are sent over the PPP.

L2TP

Comparison Performance ISP dependence. End-to-end security

IPsec Original IP Header Payload New IP Header Security Header Protocol suite AH and ESP protocol Tunnel mode of operation Headers added to original packet.

MPLS IP Header Payload Link Layer Header MPLS Shim IP Header Payload