UAB VPN Service David Wolford, Communications Network Specialist.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
SLAC Remote Access VPN over SSL Technical Presentation with Q&A.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Fermilab VPN Service What is a VPN ?.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
NetComm Wireless VPN Functionality Feature Spotlight.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Course 201 – Administration, Content Inspection and SSL VPN
Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Security Infrastructure Overview - VPN Suresh Ramasamy.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
What’s New in Fireware v11.9.5
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Network Services Update Bruce Campbell Director, Network Services Information Systems and Technology January 14,2011.
Module 5: Configuring Access for Remote Clients and Networks.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
VPN’s & Remote Access Issues David Trepp VP of Technology
Virtual Private Networks By: Scott Ayers Stacey Bilodeau David Jordan.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Operating Systems FreeBSD and Monowall Joel Jaeggli For AIT Wireless and Security Workshop.
Virtual Private Network Access for Remote Networks
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Remote Access Lecture 2.
Cisco ASA Express Security practice-questions.html.
صفاء صلحي يونس دلول بكالوريوس إدارة تكنولوجية
Virtual Private Networks
Security Protocols in the Internet
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

UAB VPN Service David Wolford, Communications Network Specialist

UAB Virtual Private Network  User Services has provided VPN for many years  First service was called PopTop and used PPTP  Second and current service uses a Cisco 3060 VPN concentrator and uses IPSEC  We currently average ~ 50 IPSEC concurrent users

System Information  Current appliance is a Cisco 3060 which has been in service for approximately eight years.  We are preparing two Cisco ASA 5550 security appliances to replace our 3060 in the near future.  The Cisco ASA 5550’s will provide load sharing redundancy and will allow us to use the Cisco SSL client.

Reasons to Upgrade Service  Cisco 3060 was originally purchased for wireless users. It was pressed into service with the blocking of Microsoft ports and is now end-of-life by Cisco.  Implementation of border firewall and plans of tighter border security will increase the need.  Cisco is favoring SSL for newer OS platforms like Windows 64-bit.

ASA5550

VPN Client Options  Cisco IPSEC client IPSEC not available for 64 Bit Windows  SSL Client

Client Download

SSL VPN Client

Cisco IPSEC Client

Departmental VPN Groups  Offers IP addresses from a defined pool of addresses for firewall traversal and resource access  DCNS can add or remove users from groups  Works with SSL and IPSEC VPN

Network Diagram

Split Tunneling

On the Horizon  Integration with campus NAC  Two factor authentication