Virtual Private Networks

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Secure Mobile IP Communication
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Module 5: Configuring Access for Remote Clients and Networks.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
NetComm Wireless VPN Functionality Feature Spotlight.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Module 5: Configuring Access for Remote Clients and Networks.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Module 10: Providing Secure Access to Remote Offices.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Securing Access to Data Using IPsec Josh Jones Cosc352.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Virtual Private Network Access for Remote Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
IPSecurity.
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
VPN: Virtual Private Network
IPSec IPSec is communication security provided at the network layer.
Examining Network Protocols
Virtual Private Network (VPN)
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Security Protocols in the Internet
Firewalls Routers, Switches, Hubs VPNs
Virtual Private Networks
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
The University of Adelaide, School of Computer Science
Introduction to Network Security
Virtual Private Network zswu
Presentation transcript:

Virtual Private Networks Shamod Lacoul CS265

What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network that encompasses links across shared or public networks like the Internet – VPN in Windows 2000: Overview by Microsoft. An encrypted or encapsulated communication process that transfers data from one point to another point securely; the security of that data is assured by robust encryption technology, and the data that flows passes through an open, unsecured, routed network. –Brown Steven, Implementing Virtual Private Networks.

Types of VPN Trusted VPN Secure VPN Hybrid VPN Provider-Provisioned VPN

Security Risks of the VPN Basic Firewalls the sole use of firewalls does do no good to protect connections in a public area. Network Attacks denial of service attacks, address spoofing, session hijacking, man-in-the-middle attack, replay attack, and detection and clean up. Cryptographic Assaults Cipher text only attack, known plaintext attack, chosen plaintext attack, chosen cipher-text attack, brute force attack, password guessers and dictionary attacks and social engineering.

Technologies in VPN Firewalls Encryption Authentication Tunneling filter packets by examining IP addresses or ports requested on ingress or egress traffic. Encryption maintains the security of data in transit to be private in a public space. Authentication to finalize that the user trying to gain access to a private network is for real. Tunneling Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) IPSec Tunnel Mode

VPN Tunneling Point-To-Point Tunneling Protocol Layer 2 Tunneling Protocol IPSec Tunnel Mode

VPN Reads Virtual Private Networks, 2nd Edition Oreilly Publishers Implementing Virtual Private Networks, Brown Steven http://www.microsoft.com/windows2000/docs/VPNoverview.doc http://www.vpnc.org