Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Enabling Secure Internet Access with ISA Server
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Intranet, Extranet, Firewall. Intranet and Extranet.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
IPSec Detailed Description and VPN
CompTIA Security+ Study Guide (SY0-401)
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
VPN: Virtual Private Network
Computer Data Security & Privacy
Virtual Private Networks (VPN)
CompTIA Security+ Study Guide (SY0-401)
Virtual Private Network (VPN)
* Essential Network Security Book Slides.
Net 431: ADVANCED COMPUTER NETWORKS
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
AbbottLink™ - IP Address Overview
Introduction to Network Security
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar

Heuristic Antivirus: 1.Content Filtering 2.Sand Boxing 3.Behavior Analysis It compares all incoming code to a set rule-base(Pattern Matching). It allows the code to run inside a virtual sandbox(Java Applets). It allows a system to remain stable while it isolates and stops the malicious code.

Tunneling Viruses Some anti-virus programs use tunneling techniques to bypass any viruses that might be active in memory when they load. Tunnel under anti- virus monitoring programs in order to bypass their monitoring functions Attempts to backtrack down the interrupt chain in order to get DOS and BIOS interrupt handlers For detection an interception program is in the background looking for specific actions

About IP Tunneling

IP Tunneling Packet Encapsulated Packet Encapsulated Packet Sending End Receiving End Tunnel

Virtual Server Implementation Load Balancer(Deals with outer world) Checked for Destination IP & port Matched for Virtual Service Choose Real Server Encapsulate packet within an IP Datagram On receive of the Packet Server process the request decapsulate the packet send the packet to User

Formation of SSH Tunnel and Implementing L2TP & PPTP

SSH Tunnel : A fat pipe between client and the server host using Port Forwarding, is created when the SSH connection is established. Forwarding a port through secure SSH tunnel. Server which uses a SSH connection while communicating with Client using smtp or imap.

L2TP (Layer two Tunneling Protocol) L2TP Access Concentrator (LAC): device, which physically terminates a call. part, which terminates and probably authenticates the PPP stream. L2TP Network Server (LNS):

Virtual networking connections combined with tunneled cryptographic protections forms a Secure VPN. Tunneling makes it harder for a router to determine the best route for a packet Tunneling in VPN was chosen to secure data going across the Internet connections

Key Points allows PPP connections to be tunneled through an IP network Slow connections and performance or even loss of connectivity on LAN does not specify special channel algorithms for authentication and encryption PPTP PPP Conn. -- >IP Network -- > Creates a VPN

Secure Web Tunneling

All Intranet Web servers can be accessed From the outside in a uniform manner. URLs are not irreparably mangled, and can be used once the principal returns to the inside of the firewall. The firewall and the principal that wishes to access internal Web resources are mutually authenticated The firewall can log and audit firewall traversals with a low Administrative overhead

Comparison with IP Tunneling

Secure Corporate Web Tunneling * Corporate Network tunneled for securing the incoming/outgoing traffic on Web. * Users can have Fully Qualified Domain Names apart with Digital Signatures. * It also accommodate a mix-and-match strategy for areas that may not offer the same technology to the entire VPN community. customers can use the tunnel endpoint identifiers that make sense for their network, whether they are connecting to devices like routers and firewalls, or users such as remote employees dialing in.

Layers Interfacing sequence

Introduction Collectively refers to the techniques, algorithms and ways of tracing code attached to a particular interrupt & then finding the original DOS/BIOS code * Laser instruments enable many tasks to be carried out by one person Major points * All readings and subsequent actions take place at point of interest rather than at the instrument.

Static Route Tunneling Network BGP Network

About the General site surveying

Conclusion Advantages of Lasers over conventional instruments. They can function over Longer Ranges. They put the operator at the point being set out rather than at the instrument. They enable substantial savings on personnel cost owing to single person operation. Several machines can be controlled simultaneously. They can be used in areas where poor surface conditions preclude conventional methods. Work can be carried out at night.

THANK YOU