91.527 - Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Remote Networking Architectures
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 4: Designing Routing and Switching Requirements.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Internet (THEnet ISP Gateway) Home PC Home Laptop Wireless AP/RouterVPN Concentrator Firewall Hub (running WireShark for Monitoring) Work Server Work PCs.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport Test Site

VPN Concept VPN Benefit SSL SonicWall VPN-200 Case Study – SFO Airport Site Using VNC (Virtual Network Control) Conclusion Virtual Private Network Access for SFO Airport Lidar System

3 Institutions, companies often want private networks for security. – Costly! Separate routers, T1 links, DNS infrastructure. With a VPN, institution’s inter-office traffic is sent over public Internet instead. – But inter-office traffic is encrypted before entering public Internet Virtual Private Networks (VPNs)

4 San Francisco New York Dallas Chicago Fully Meshed Leased Line or Frame Relay Network San Francisco New York Dallas Chicago Internet Fully meshed VPN network LAN-to-LAN: Leased Line and VPN

IP header IPsec header Secure payload IP header IPsec header Secure payload IP header IPsec header Secure payload IP header payload IP header payload headquarters branch office salesperson in hotel Public Internet laptop w/ IPsec Router w/ IPv4 and IPsec Router w/ IPv4 and IPsec Virtual Private Network (VPN)

6 VPN Benefits Save Money (Reduce NW Costs by 30-60%) –Reduce private leased line charges Increase Business Speed and Flexibility –Internet can be accessed everywhere through many technologies –Internet capacity is available on demand Save Money (Reduce NW Costs by 30-60%) –Reduce private leased line charges Increase Business Speed and Flexibility –Internet can be accessed everywhere through many technologies –Internet capacity is available on demand VPN Technology

7 Basic VPN Concepts –Tunneling –Encryption –Authentication Associated VPN Concepts –Routing –Firewalling –Load Balancing Basic VPN Concepts –Tunneling –Encryption –Authentication Associated VPN Concepts –Routing –Firewalling –Load Balancing

8 Sonicwall SSL-VPN 200

9 VPN Components Sonicwall VPN-200 appliance – Dedicated Hardware Platform – Secure Sockets Layer VPN NetExtender for Windows – Not require any manual client installation. – Transparent to end user – IPSec VPN – Works with existing client and server applications

Router Setup with static IP address

Router Port forwarding

SonicWall VPN-200 Setup

SSL-VPN NetExtender

Equipments & ISP Linksys router Cable/DSL 4-Ports BEFSR41 $125 Sonicwall VPN 200 $500 NightHawk Power Recycle $500 4 Ports Web Remote power $175 8 Ports Switch $50 ISP Wireless with static IP Covad Communication provide the service 10/10M at the cost $900 per month

Cambridge-SFO Testing Site Internet Router Cambridge, MA Benefits: Extend the network to remote users WinExtraction PC Lidar System NAS VPN Client NetExtender ISP Sonic VPN ADS-B PC SFO Lidar Testing Site

Linksys Router SonicW VPN Power Recycle Night Hawk Outlets Web Remote Power Control ISP Covad On/Off Power 110 V 8 ports Switch 10/100 Lidar System /100 10/10 Wireless 11A-5.6GHz 10/100 On/Off Win Extraction PC Weather Sensor PC On/Off 10/100 FTP Server from Cambridge Virtual LAN Granting VPN Access Requesting VPN Access On/Off VPN Access at SFO Lidar Network

17 Case Study – SFO Lidar System SFO Lidar Systems: Using VNC (virtual Network Control) application to access to – A Lidar System at San Francisco Airport SOLUTION It creates and maintains a virtual link. It encrypts and decrypts data to reduce snooping by others It guarantees the authenticity of the sender and receiver

WindTracer Lidar at SFO Airport Wireless ISP

Environmental Equipment Shelter: Interior Subsystems-Lidar Movable LRU (Scanner Driver) Movable LRU (SMCC) Movable LRU (Monitor/Keyboard) Movable LRU (Gateway PC) Tall Equipment Rack Houses majority of electronics Local GUI operation Tall Equipment Rack Houses majority of electronics Local GUI operation Movable LRUs can be slid out without disconnecting cables from rear panel.

SSL-VPN NetExtender Connection to SFO

21 Case Study – SFO Lidar System SFO Lidar Systems: Using VNC (virtual Network Control) application to access to – A Lidar System at San Francisco Airport

22 Connecting to SFO Lidar System

Lidar Display

24 Conclusion Save Money (Reduce NW Costs by 30-60%) Increase Business Speed and Flexibility Improve Security Use Existing Applications, Infrastructure and User Environments Build a secured, easy to use, scalable and standard base Business Network Increase your Business competitiveness thru SonicWall VPN

25 Thank You