Virtual Private Networks

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Remote Networking Architectures
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
Virtual Private Networks (VPN)
CIT 480: Securing Computer Systems
Virtual Private Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
Virtual Private Networks
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks Ryan Becker Chris Borowski May 21, 2004

VPN Basics Securely connects any two networks across distances: Business to Business Office to Office Employee to Office Makes office resources such as file servers, print servers, and local shares accessable as if they were in the cubicle next door

VPN Types Trusted Secure Hybrid

Trusted VPNs Using dedicated leased line provided by ISP Not encrypted ISP maintains integrity of the line

Secure VPNs Utilizes public lines Company is responsible for securing their own information through encryption schemes Encapsulates individual packets with specific protocols

Hybrid VPNs Combination of Trusted and Secure VPN Uses leased lines and encryption mechanism Holds both parties responsible for maintaining security of transmitted packets

VPN Voyage

Pros and Cons of VPNs Pros: Cons: Seamless information flow Allows Telecommuting Allows easier inter-office/inter-business communication Provides secure method for ATM/Bank transactions Cons: Breaches in security mean severe loss of data integrity and privacy Securing data is an uphill battle

Secure VPN Tunneling Turns LAN traffic into traffic secured for the open internet: Carrier protocol - The outside protocol used by the VPN routers to communicate over the internet (PPP) Encapsulating protocol - The protocol that is wrapped around the original data and protects it from prying eyes (GRE, IPSec, PPTP, L2TP) Passenger protocol – This is the original protocol in which the packet was being sent across the LAN (IPX, NetBeui, IP)

Point to Point Tunneling Protocol (PPTP) Encapsulation Microsoft Proprietary VPN implementation Critics say it is easily breakable and flawed Many still use it because of its easy integration with Microsoft OS’s

Layer 2 Tunneling Protocol (L2TP) Microsoft’s answer to outdated PPTP Relies on PPP implementing the TCP/IP trafficking Requires choice of encryption scheme: SSHv1: vulnerabilities with “man in the middle” attack SSHv2: vulnerabilities with traffic analysis Still considerably more secure than PPTP

IPSec Most popular VPN implementation Three step security scheme: Internet Key Exchange (IKE) occurs to transfer encryption/decryption keys to both sides of the VPN. The Authentication Handler (AH) verifies that both sides of the VPN are who they say they are. The Encapsulating Security Payload (ESP) will encode the packets using the vendor’s choice of encryption scheme. Complicated protocol with vague definitions Therefore many implementations Administrative overhead

AAA Servers Authentication: Who are you? Authorization: What can you do? Accounting: What did you do?

Security Thoughts from Doug Engelbart Inventor of the ‘Mouse’ Founder of ARPANET: ‘Second’ Person on the internet Stressed importance of secure communication protocols “VPN’s are a great way for companies or individuals to securely communicate.”

References Computer Hall of Fame. 16 May 2004 <http://www.computerhalloffame.org/> Englebert, Doug. Personal Interview. May 17, 2004. Fougere, Jay, “VPNs, 101” Web Pro News, 15 May, 2004 <http://www.webpronews.com/it/networksystems/wpn-21-20020502VPNs101.html> Lemos, Robert, “VPN flaw puts internal networks at risk”, September 26, 2002 ZDNet Security News, 16 May, 2004 <http://zdnet.com.com/2100-1105-959659.html> Tyson, Jeff, “How Stuff Works”, 15 May 2004 <http://computer.howstuffworks.com/vpn.htm> “VPN Technologies” January 2004 VPN Consortium, 15 May 2004, <http://www.vpnc.org/vpn-technologies.html>