VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Defining Network Infrastructure and Network Security Lesson 8.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan

INTRODUCTION What is a VPN?

Introduction: What is a VPN? Virtual Private Network

Introduction to VPN

Introduction (continued): Four Categories: Trusted VPN Secure VPN Hybrid VPN Provider-provisioned VPN

VPN TOPOLOGY How does a VPN work?

VPN Topology: Types of VPNs Remote access VPN Intranet VPN Extranet VPN

VPN Topology: Remote Access VPN

VPN Topology: Intranet VPN

VPN Topology: Extranet VPN

VPN Topology: Advantages and Disadvantages of VPN Advantages: Greater scalability Easy to add/remove users Reduced long-distance telecommunications costs Mobility Security

VPN Topology: Advantages and Disadvantages of VPN Disadvantages Lack of standards Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors

VPN Topology: What is needed? Existing hardware (Servers, workstations,…) Internet connection VPN - Router/Switch Software to create and manage tunnels Security Device such as firewall

VPN Topology: How it works Operates at layer 2 or 3 of OSI model Layer 2 frame – Ethernet Layer 3 packet – IP Tunneling allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet to ensure data security against unwanted viewers, or hackers.

VPN COMPONENTS What are the components of VPN?

VPN Components Protocols Security Appliances

VPN Components: Protocols IP Security (IPSec) Transport mode Tunnel mode Point-to-Point Tunneling Protocol (PPTP) Voluntary tunneling method Uses PPP (Point-to-Point Protocol)

VPN Components: Protocols Layer 2 Tunneling Protocol (L2TP) Exists at the data link layer of OSI Composed from PPTP and L2F (Layer 2 Forwarding) Compulsory tunneling method

Example of packet encapsulation

VPN Components: Security Encryption Technique for scrambling and unscrambling information Unscramble – called clear-text Scrambled information – cipher-text

VPN Components: Security Keys Secret code that the encryption algorithm uses to create a unique version of cipher-text 8-bits keys = 256 combinations or two to the eighth power 16-bits keys = 65,536 combinations or two to the 16 th power 56-bits keys = 72,057,594,037,927,900 or two to the 56 th power 168-bits keys …

VPN Components: Security Authentication Determine if the sender is the authorized person and if the data has been redirect or corrupted User/System Authentication Data Authentication

VPN Components: Appliances Intrusion detection firewalls Monitors traffic crossing network parameters and protects enterprises from unauthorized access Packet-level firewall checks source and destination Application-level firewall acts as a host computer between the organization’s network and the Internet

VPN PRODUCTIVITY AND COST BENEFITS How can companies benefit from VPN?

VPN Productivity and Cost Benefits: Benefits Extends geographic connectivity Boosts employee productivity Improves Internet security Scales easily

VPN Productivity and Cost Benefit: Costs Costs associated with implementing VPN In House implementation Outsourced implementation Middle Ground implementation

QUALITY OF SERVICE (QoS) WHAT IS QoS?

What is QoS?

VPN Productivity and Cost Benefits: Quality of Service Question: “Do I get acceptable response times when I access my mission critical applications from a remote office?”

QoS Options Two models are available for QoS functionality: Differentiated Services Model (DiffServ) Integrated Services Model (IntServ)

Differentiated Services Model (DiffServ)

Integrated Services Model (IntServ)

THE FUTURE OF VPN Where is VPN headed?

Future of VPN VPN popularity Companies choosing VPN Cost efficient? New way of communicating?

Future of VPN: Companies with VPN

CONCLUSION Any questions?