Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
11 Setting Up a Virtual Private Network
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
1 Guide to Network Defense and Countermeasures Chapter 7.
Chapter 11: Setting up a Virtual Private Network.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Guide to Network Defense and Countermeasures Third Edition
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted messages that others cannot decipher

What VPNs Are VPN –Virtual network connection –Uses the Internet to establish a secure connection Secure tunnel –Extends an organization’s network Endpoints –Specified computers, users, or network gateways

Why Establish a VPN? Business incentives driving VPN adoption –VPNs are cost-effective –VPNs provide secure connection for remote users Contractors Traveling employees Partners and suppliers VPN Components –VPN server or host Configured to accept connections from clients –VPN client or guest Endpoints connecting to a VPN

Why Establish a VPN? (continued) VPN Components –Tunnel Connection through which data is sent –VPN protocols Sets of standardized communication settings Used to encrypt data sent along the VPN –Types of VPNs Site-to-site VPN –Gateway-to-gateway VPN Client-to-site VPN –Remote access VPN

Why Establish a VPN? (continued) Hardware versus software VPNs –Hardware-based VPNs Connect one gateway to another Routers at each network gateway encrypt and decrypt packets VPN appliance –Designed to serve as VPN endpoint –Join multiple LANs Benefits –Scalable –Better security

Why Establish a VPN? (continued) Hardware versus software VPNs (continued) –Software-based VPNs Integrated with firewalls Appropriate when participating networks use different routers and firewalls Benefits –More cost-effective –Offer maximum flexibility

Summary VPNs do not make use of dedicated leased lines VPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secure VPN components –VPN servers –VPN clients –Protocols

Summary (continued) VPN types –Site-to-site –Client-to-site Encapsulation encloses one packet within another –Conceals the original information VPN protocols –Secure Shell (SSH) –Socks version 5 –Point-to-Point Tunneling Protocol (PPTP) –Layer 2 Tunneling Protocol (L2TP)