Cengage Learning: Computer Networking from LANs to WANs

Slides:



Advertisements
Similar presentations
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Protocol Security (IPSec)
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Intranet, Extranet, Firewall. Intranet and Extranet.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Defining Network Infrastructure and Network Security Lesson 8.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Networks – Network Fundamentals
Virtual Private Networks and IPSec
IPSec Detailed Description and VPN
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
Remote Access Lecture 2.
Using MIS 2e Chapter 6 Appendix
Virtual Private Networks (VPN)
NET323 D: Network Protocols
Chapter 5 Network and Transport Layers
Chapter 4 Core TCP/IP Protocols
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Security Protocols in the Internet
NET323 D: Network Protocols
Firewalls Routers, Switches, Hubs VPNs
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

Cengage Learning: Computer Networking from LANs to WANs Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 8 The Internet Cengage Learning: Computer Networking from LANs to WANs

Cengage Learning: Computer Networking from LANs to WANs Objectives Describe the basic organization of the Internet Internet versus intranet Network address translation (NAT) Virtual Private Networks (VPN) Cengage Learning: Computer Networking from LANs to WANs

The Organization of the Internet The internet is organized into several top-level domain categories The name of an Internet host shows the category of the top- level domain. E.g. mimos.com domain – name of company uniten.edu domain – name of educational institution Each domain is registered on appropriate root servers E.g. mimos.com is known by .com root server By using DNS, domain name associated with an IP address will be resolved Growing Internet popularity - Shortage of available networks Cengage Learning: Computer Networking from LANs to WANs

Table 15-1 Common top-level domain names Computer Networking From LANs to WANs: Hardware, Software, and Security

Cengage Learning: Computer Networking from LANs to WANs Internet vs Intranet Cengage Learning: Computer Networking from LANs to WANs

Cengage Learning: Computer Networking from LANs to WANs Internet Internet is a world-wide/global system of interconnected computer networks. Internet uses the standard Internet Protocol (TCP/IP) Every computer in internet is identified by a unique IP address (e.g. 192.228.102.3) which identifies a computer location A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name. For example, a DNS server will resolve a name  http://www.uniten.edu.my to a particular IP address to uniquely identify the computer on which this website is hosted. Internet is accessible to every user all over the world. Cengage Learning: Computer Networking from LANs to WANs

Cengage Learning: Computer Networking from LANs to WANs Intranet Intranet is system in which multiple PCs are networked to be connected to each other. PCs in intranet are not available to the world outside of the intranet. Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet. E.g. Uniten’s portal Each computer in Intranet is also identified by a IP Address, which is unique among the computers in that Intranet. Cengage Learning: Computer Networking from LANs to WANs

Network Address Translation (NAT) As the popularity of the Internet grew, and as the number of the Internet grew, the available networks dropped. There are a methods to share an internet connection among multiple clients. One of them is Network Address Translation Cengage Learning: Computer Networking from LANs to WANs

Network Address Translation (NAT) Is a technique where multiple network devices on a local network (also called the inside network) to be mapped to IP addresses on an external network Internal IP addresses mapped on a rotating basis NAT table: Contains the known mappings Initialized with a set of translations Cengage Learning: Computer Networking from LANs to WANs

Network Address Translation (NAT) Advantages of NAT: Reduces number of outside IP addresses required Enhances security Hides internal IP addresses Cengage Learning: Computer Networking from LANs to WANs

Virtual Private Networks VPN allows for remote private LAN to communicate securely through untrusted public network such as Internet. Only authorized network members access data. Uses IP tunneling protocol and security services that are transparent to private network users Private LAN that connected to the Internet also can connect to other LANs by combining tunneling, encryption, authentication (offer the highest level of security Tunneling Data transferred through the public network in an encapsulated form All data including sender, destination addresses enclosed within a packet Cengage Learning: Computer Networking from LANs to WANs

Figure 15-7 RWA Software VPN (logical view) RWA: Routing Wavelength Assignment Computer Networking From LANs to WANs: Hardware, Software, and Security

Virtual Private Networks There are VPN protocols to secure the transport of data traffic over a public network infrastructure: IPSec (IP Security) SSL (Secure Socket Layer) and TLS (Transport layer Security) PPTP(Point to Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) Cengage Learning: Computer Networking from LANs to WANs

Virtual Private Networks IP Security (IPSec) IPSec includes tunneling, encryption and authentication Purpose: to secure communication over internet How it works: Offer a solution to data privacy, integrity and authentication that is network independent, application independent, and supports all IP services (HTTP, FTP, SNMP, etc). Cengage Learning: Computer Networking from LANs to WANs

Virtual Private Networks Support only tunneling protocol Point-to-Point Tunneling protocol (PPTP) Tunneling protocol to connect a remote client to a private server over the Internet. Easy to setup Low overhead and thus good speeds Low encryption - not secured Cengage Learning: Computer Networking from LANs to WANs

Virtual Private Networks Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data communications traffic between two sites over the Internet.  Supported on most modern devices and OSes. Easy to setup on MAC and Windows. Does not do any encryption by itself so need to use IPsec for encryption. Cengage Learning: Computer Networking from LANs to WANs

Virtual Private Networks Advantages of using PPTP over L2TP and IPSec : PPTP does not require digital certificates PPTP can be used by all versions of Windows and many other Operating System (OS), i.e. UNIX/Linux, Netware, Mac OS PPTP clients can be located behind NAT VPN using PPTP or L2TP provides capabilities : User authentication, address management, data encryption, encryption management and support multiple protocols to be delivered. Cengage Learning: Computer Networking from LANs to WANs

Cengage Learning: Computer Networking from LANs to WANs Summary Internet is a world-wide/global system of interconnected computer networks. Intranet is system in which multiple PCs are networked to be connected to each other. NAT-Is a technique where multiple network devices on a local network (also called the inside network) to be mapped to IP addresses on an external network VPN allows private LAN secure communication Cengage Learning: Computer Networking from LANs to WANs