Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Remote Desktop Connection Techniques Wireless Communication Networks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Network (VPN)
Virtual Private Networks (VPN)
CIT 480: Securing Computer Systems
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
Virtual Private Networks
VIRTUAL PRIVATE NETWORKS (VPN)
Virtual Private Network (VPN)
Virtual Private Network
VPN What, where, who, why when?.
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations need a fast, secure and reliable way to share information across computer networks. traveling employees like salespeople need an equally secure and reliable way to connect to their business's computer network from remote locations.

A VPN is a private network that uses a public network (usually the Internet) to connect resources in remote areas. VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee.

to make remote connections The most common way to connect computers between multiple offices was by using a leased line Intranets VPN

VPN provides a business with the following benefits: Extended connections across multiple geographic locations without using a leased line Improved security for exchanging data Flexibility for remote offices and employees to use the business intranet over an existing Internet connection as if they're directly connected to the network Savings in time and expense for employees to commute if they work from virtual workplaces Improved productivity for remote employees

Essential VPN features: Security -- The VPN should protect data while it's traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it. Reliability -- Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections. Scalability -- As a business grows, it should be able to extend its VPN services to handle that growth without replacing the VPN technology altogether.

Traditional Connectivity [From Gartner Consulting]

What is VPN? Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations. Terminologies to understand how VPNs work.

Private Networks vs. Virtual Private Networks Employees can access the network (Intranet) from remote locations. Secured networks. The Internet is used as the backbone for VPNs Saves cost tremendously from reduction of equipment and maintenance costs. Scalability

Four Critical Functions Authentication – validates that the data was sent from the sender. Access control – limiting unauthorized users from accessing the network. Confidentiality – preventing the data to be read or copied as the data is being transported. Data Integrity – ensuring that the data has not been altered

Encryption Encryption -- is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature – for authentication

Encrypted Inner Datagram Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Data Encapsulation [From Comer] Two types of end points: Remote Access Site-to-Site

Virtual Private Networks (VPN) Basic Architecture

Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol(Supports connectivity b/w a single user and a LAN) L2TP -- Layer 2 Tunneling Protocol(supports user-to –LAN and LAN-to-LAN) IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above

Types of Implementations What does “implementation” mean in VPNs? 3 types Intranet – Within an organization Extranet – Outside an organization Remote Access – Employee to Business

Remote Access Virtual Private Network

A remote-access VPN allows individual users to establish secure connections with a remote computer network. There are two components required in a remote-access VPN. The first is a network access server A NAS might be a dedicated server, or it might be one of multiple software applications running on a shared server. It's a NAS that a user connects to from the Internet in order to use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN

The other required component of remote-access VPNs is client software. The client software sets up the tunneled connection to a NAS, which the user indicates by its Internet address. The software also manages the encryption required to keep the connection secure.

Remote Access Virtual Private Network (From Gartner Consulting)

Advantages: Cost Savings Eliminating the need for expensive long-distance leased lines Reducing the long-distance telephone charges for remote access. Transferring the support burden to the service providers Operational costs Cisco VPN Savings Calculator

Advantages: Scalability Flexibility of growth Efficiency with broadband technology

Disadvantages VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology

A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. There are two types of site-to-site VPNs: Intranet-based -- If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN. Extranet-based -- When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets.

Industries That May Use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged