Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Virtual Private Networks (VPN)
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
NetComm Wireless VPN Functionality Feature Spotlight.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
Frame Relay, ATM and VPN Metropolitan Area Ethernet Overview.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Advanced Networking Devices
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Virtual Private Networks By: Scott Ayers Stacey Bilodeau David Jordan.
Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
UTM ( Unified Threat Management) Firewalls  Firewall Throughput: 150 Mbps  VPN Performance: 45 Mbps (3DES/AES)  1 x 10/100/1000 Ethernet WAN Port 
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Defining Network Infrastructure and Network Security Lesson 8.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
MTA Network Fundamental Cram Sesion
Network Security Solution
Virtual Private Network (VPN)
Virtual Private Network
SPECIAL OFFER NetDefend UTM Firewall RRP€ 1063 SP€ 932 DFL-870
Implement Inter-VLAN Routing
Virtual Private Networks
Implement Inter-VLAN Routing
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
Implement Inter-VLAN Routing
Advanced Networking Devices
Implement Inter-VLAN Routing
Presentation transcript:

Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott

Virtual Private Networks

PPTP VPNs Point-to-Point Tunneling Protocol (PPTP) – PPTP uses a control channel over TCP – PPTP was the first VPN protocol that was supported by Microsoft Dial-up Networking – Many security vulnerabilities found; no longer recommended by Microsoft

L2TP & SSL VPN’s Layer 2 Tunneling Protocol (L2TP) – VPN Concentrator (LAC) – LNS – Site-to-site VPN connection – Uses IPSec for security of connection

L2TP & SSL VPN’s SSL VPNs – Other options than PPTP and L2TP. OpenVPN Pure IPSec connections are possible. – Security encoded directly into application

Virtual LANs Security CamerasUsers Printers VoIP Phones

Virtual LANs Users Printers Security Cams Phones

Virtual LANs

Trunk port Trunking Sw-1 Sw-2 Router Trunk

Virtual Trunk Protocol (VTP) Trunking Sw-1Sw-4 Sw-2 Sw-3

Configuring a VLAN-capable Switch Managed Switch

Configuring a VLAN-capable Switch

InterVLAN Routing Mr. Roger’s House, VLAN 100 Neighborhood of Make-Believe, VLAN 101

Multilayer Switches Load Balancing QoS and Traffic Shaping Network Protection

Load Balancing

Multilayer Switch Using a multilayer or content switch –Content Switch

QoS & Traffic Shaping Quality of service (QoS) Traffic Shaping

Network Protection Intrusion Detection/Prevention –Intrusion Detection System (IDS) –Intrusion Prevention System (IPS) Port Mirroring Proxy Servers Port Authentication

Questions?