Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Defining Network Infrastructure and Security
Layer 2 Tunneling Protocol (L2TP)
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Virtual Private Networks (VPN)
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Virtual Private Network
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
K. Salah1 Security Protocols in the Internet IPSec.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Network
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
VPN: Virtual Private Network
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Chapter 8 – Data switching and routing
Presentation transcript:

Virtual Private Networks

Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages High Cost No flexibility

What is VPN Virtual Private Network is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated connection such as leased line, a VPN uses “virtual” connections routed though the internet.

VPN Types Remote-access –single remote network device to intranet Site-to-site connect multiple fixed sites over a public network –Intranet -based –Extranet-based

VPN Technologies Tunneling Authentication –Identity verification of network system. Access Control –When an access request is presented, resource makes a decision to allow the access request to proceed or not. –Performed at tunnel endpoints.

Tunneling Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network. A C D E F G HI B Tunnel

Payload Original IP Header New IP Header Original IP Header

VPN Tunneling Protocols Layer 2 tunneling protocols –A link layer frame is placed into the payload of a protocol data unit(PDU) from some other layer, including another layer 2 frame. –Tunnel PPP frames through an IP network. –Point-to-Point Tunneling Protocol (PPTP),Layer 2 Forwarding protocol (L2F), Layer 2 Tunneling Protocol (L2TP).

VPN Tunneling Protocols Layer 3 tunneling protocols –A layer 3 frame is placed into the payload of a protocol data unit(PDU) from some other layer,or another layer 3 packet. –VPNs within an IP network –IPsec Label switching protocol –Label is placed between layer 2 and layer 3 header. –MPLS

Layer 2 tunneling protocol Tunnel PPP frames through the internet to the home network. Tunneling protocol –Access concentrator(Client part) –Network Server(server part)

PPTP PPP access by remote computers to a private network through the Internet 1. Remote user dials in to the local ISP network access server using PPP.

PPTP 2. The PAC establishes a control channel (TCP) across the PPP connection and through the internet to the PNS attached to the home network.

PPTP 3. Parameters for the PPTP channel are negotiated over the control channel, and the PPTP tunnel is established.

PPTP 4. A second PPP connection is made from the remote user, through the PPTP tunnel between the PAC and the PNS, and into the private networks NAS.

PPTP 5. IP datagrams or any other protocol’s datagrams are sent inside the PPP frames

L2F Tunnel is constructed from the service provider. 1.Remote user dials in to the local ISP network access server using PPP/SLIP.

L2F 2.L2F builds a tunnel from the NAS to the private network. Uses packet-oriented protocol that provides end-to-end connectivity, such as UDP, frame relay, etc. as the encapsulating protocol.

L2F 3.L2F establishes PPP connection between NAS and home gateway.

L2F 4.IP packets are sent over the PPP.

L2TP

Comparison Performance ISP dependence. End-to-end security

IPsec Payload Original IP Header New IP Header Original IP Header Security Header Protocol suite AH and ESP protocol Tunnel mode of operation Headers added to original packet.

MPLS Payload IP Header Link Layer Header IP Header MPLS Shim