Virtual Private Networks

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Virtual Private Networks and IPSec
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Understand Internet Security LESSON Security Fundamentals.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
IP Security
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Internet and Intranet Fundamentals
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPN)
IPSec VPN Chapter 13 of Malik.
CIT 480: Securing Computer Systems
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Virtual Private Network
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
NET 536 Network Security Lecture 5: IPSec and VPN
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks Alexandra Altea Curti 5^AiS a.s. 2014-15

What is a VPN? Virtual Private Network Private network Extended LAN WAN

What do VPNs do? Remote access Individual users Companies Offices

Remote-access VPN Individual users Secure connection NAS Client Software Like if they were directly plugged into the network’s servers.

Site-to-site VPN Offices Secure connections Intranet-based Extranet-based Extends the company’s network in such a way that the computer resources from one location are available to employees at other locations.

Security Authentication Secrecy Integrity and authenticity protocols Tunneling mechanism

Transmission mechanisms Transport mode Software Encrypted data Original header Encryption and decryption guaranteed by software

Transmission mechanisms Tunneling mode Encapsulates encrypted data New IP header Readable only with decryption key

IPsec (IP security) Securing communications Encrypts every IP packet Protocols: Authentication Header (AH) Encapsuling Security Payload (ESP) Internet Key Exchange Explain protocols fot mutual authentication!

Internet Key Exchange (IKE) Mutual authentication and key-exchange Peer-to-peer communication SA (Security Association): Security policies defined for communication between two or more entities Security associations are security policies defined for communication between two or more entities; the relationship between the entities is represented by a key. The IKE protocol ensures security for SA communication without the preconfiguration that would otherwise be required.

Cryptography Encrypted data Long key Secrecy

Proxy server VS VPN Proxy VPN Tunneling Own IP address Fully encrypted traffic High costs Own IP address Traffic not encrypted Bypassed easily

VPNinja PPTP VPN service US and UK servers Bypass corporate/government firewalls Anonymous Internet access

Other VPN services Numerous countries Local WiFi Mobile devices, PCs, tablets, computers Apple, Windows, Android

Thank you for your attention

Network Access Server (NAS) Media gateway/Remote Access Server (RAS) VPN access Authentication

Client Software VPN connection Incorporated or downloaded app Cryptography for secure connection

Intranet site-to-site VPN Offices in remote locations Separated LANs One single WAN Connect each separate LAN into a single WAN.

Extranet site-to-site VPN Partners, suppliers, clients (companies or individuals) Connect LANs Work together in a secure environment