Virtual Private Network

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
VIRTUAL PRIVATE NETWORKS (VPN)
Virtual Private Networks
Module 2: Configure Network Intrusion Detection and Prevention
Virtual Private Network (VPN)
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Chapter 17: Client/Server Computing
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Network VPN Virtual Private Network

content Tunneling Four Protocols used in VPN Types of implementations Advantages and Disadvantages Applications of VPN Industries that may use a VPN Some BUSINESSES that may use a VPN Future of a VPN content

Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Original Datagram Encrypted Inner Datagram Outer Datagram Data Area Datagram Header

Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above Four Protocols used in VPN

Types of implementations Three Types of implementation. Intranet – Within an organization Extranet – Outside an organization Remote Access – Employee to Business

Advantages and Disadvantages Eliminating the need for expensive long-distance leased lines Reducing the long-distance telephone charges for remote access. Operational costs Flexibility of growth Efficiency with broadband technology VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology Advantages and Disadvantages

APPLICATIONS OF VPN Site-to-Site VPNS Large-scale encryption between multiple fixed sites such as remote offices and central offices. Network traffic is sent over the branch office Internet connection. This saves the company hardware and management expenses. Site-to-Site VPNS

APPLICATIONS OF VPN Remote Access Encrypted connections between mobile or remote users and their corporate networks Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server. Ideal for a telecommuter or mobile sales people. VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable Remote Access

Industries that may use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged

Some BUSINESSES that may use a VPN CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN ITW Foilmark secured remote location orders, running reports, & internet/intranet communications w/ a 168-bit encryption by switching to OpenReach VPN Bacardi & Co. Implemented a 21-country- 44- location VPN

Future of a VPN VPNs are continually being enhanced. As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. Networks are expected to converge to create an integrated VPN Improved protocols are expected, which will also improve VPNs.

SUMMURY In my conclusion virtual private network is an, Eliminating the need for expensive long-distance leased lines Reducing the long-distance telephone charges for remote access. Transferring the support burden to the service providers Operational costs Flexibility of growth Efficiency with broadband technology SUMMURY

1:Feilner, Markus. "Chapter 1 - VPN—Virtual Private Network" 1:Feilner, Markus. "Chapter 1 - VPN—Virtual Private Network". OpenVPN: Building and Integrating Virtual Private Networks 2: Address Allocation for Private Internets, RFC 1918, Y. Rekhter et al. 3: RFC 2917, A Core MPLS IP VPN Architecture 4: Layer Two Tunneling Protocol "L2TP", RFC 2661, W. Townsley et al. 5: IP Based Virtual Private Networks, RFC 2341, A. Valencia et al 6: Point-to-Point Tunneling Protocol (PPTP), RFC 2637, K. Hamzeh et al. 7: Http://en.wikipedia.org/wiki/vpn References