VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.

Slides:



Advertisements
Similar presentations
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Layer 2 Tunneling Protocol (L2TP)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Virtual Private Network
1 Chapter Overview Using Remote Access Using Virtual Private Networks Using NAT and ICS Using Terminal Services.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Windows Server 2008 Chapter 9 Last Update
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Module 6: Configuring and Troubleshooting Routing and Remote Access
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Configuring and Troubleshooting Routing and Remote Access
Virtual Private Network (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse

VPN Introduction Virtual private networking (VPN) in Microsoft Windows 2000 allows mobile users to connect over the Internet to a remote network. With virtual private networking, the user calls the local ISP and then uses the Internet to make the connection to the Network Access Server (NAS). Users only make a local call to the ISP instead of expensive long distance telephone calls to the remote access server.

How VPN Works ISA Server is configured as a VPN Server The local ISA VPN computer connects to its ISP The remote VPN wizard runs on the ISA Server on the remote network The remote ISA Server VPN computer connects to its ISP When a computer on the local network communicates with a computer on the remote network, data is encapsulated and sent through the VPN tunnel

Main Modules System Requirement VPN Requirement Microsoft Layer 2 Tunneling Protocols Cables/Service for Internet Connection How to Install and Enable VPN How to Configure the VPN Server (Configure the Remote Access Server as a Router) How to Configure the VPN Client

Module System Requirement

Microsoft Windows 2000, Server Microsoft Windows 2000, Professional

END OF SYSTEM REQUIREMENT MODULE

Module VPN Requirement

User Authentication Address Management Data Encryption Multi-Protocol Support Access Management

User Authentication The solution must identify the user’s identity and only allow access to authorized users. The user account can be a local account on the VPN server or, in most cases, a domain account granted appropriate dial-in permissions. The default policy for remote access is “Allowed access if dial-in permission is enabled.”

Address Management VPN must assign the client an IP address on the private network The VPN server can assign the clients IP address using DHCP or a static pool of IP addresses Clients typically will have an IP address from the ISP and an IP on the private network after the VPN connection is established

Data Encryption Data sent and received over the Internet must be encrypted for privacy PPTP and L2TP use PPP-based data encryption methods Optionally you can use Microsoft Point-to-Point Encryption (MPPE), based on the RSA RCA algorithm Microsoft Implementation of the L2TP protocol uses IPSec encryption to protect the data stream form the client to the tunnel server.

Multi-Protocol Support Microsoft Layer 2 Tunneling Protocol supports multiple payload protocols, which makes it easy for tunneling clients to access their corporate networks using IP, IPX, and NetBUI.

Access Management Manage addresses and name server –VPN must have IP address available to assign to VPN client during the IP Control Protocol (IPCP) negotiation phase of the connection process. –The IP address assigned to the VPN client is assigned to virtual interface of the VPN client. Manage access by user account Manage access by group membership

END OF VPN REQUIRMENT MODULE

Module Microsoft Layer 2 Tunneling Protocols

PPTP – Point-to-Point Tunneling Protocol –Uses a TCP connection for tunnel maintenance and generic routing encapsulated PPP frames for tunneled data. –The payloads of the encapsulated PPP frames can be encrypted and/or compressed. L2TP – Layer 2 Tunneling Protocol –Uses UDP and a series of L2TP messages for tunnel maintenance.

END OF MICROSOFT LAYER 2 TUNNELING PROTOCOL

Module Cables/Service for Internet Connection

Cables/service for Internet Connection Should use a dedicated line such as T-1, Fractional T- 1, or Frame Relay. –T-1: a dedicated phone connection supporting data rates of 1.544Mbits per second, consists of 24 individual channels, each supports 64Kbits per second. –Fractional T-1: One or more channels of a T-1 services, less bandwidth, and less expensive. –Frame Relay: ( a way of utilizing existing T-1 and T-3 lines owned by a service provider), a packet- switching protocol for connecting devices on a WAN.

END OF CABLES/SERVICE FOR INTERNET CONNECTION MODULE

Module How to Install and Enable VPN

Install and Enable VPN VPN is automatically installed when one installs Windows 2000

INTERNET CONNECTION NEDDED (DSL) CAN LEASE T-1 LINE COMPANY WILL PROVIDE REAL IP ADDRESS

END OF HOW TO INSTALL AND ENABLE VPN MODULE

Module How to Configure the VPN Server

How to Configure the VPN Server (Configure the Remote Access Server as a Router) : Preview Allow remote access server to forward traffic properly in side network. Allow other locations in the intranet to be reached from the remote access. Configure as router with static route or routing protocols.

Steps for Configuring Remote Access Server as a Router start Administrative Tools Click Routing & Remote AccessRight-click Server Name Click Properties On General tap Click Enable This Computer As a Router Select either LAN routing only or LAN and demand dial routing Ok

END OF HOW TO CONFIGURE THE VPN SERVER MODULE

Module How to Configure the VPN Client

END OF HOW TO CONFIGURE A VPN CLIENT

Summary VPN must assign the client an IP address on the private network Microsoft Implementation of the L2TP protocol uses IPSec encryption to protect the data stream form the client to the tunnel server

Web Reference For more information on VPN, visit –Keyword “VPN”

Glossary Virtual Private Network (VPN)- a network that is constructed by using public wires to connect nodes. Tunneling- A technology that enables one network to send its data via another network's connections. Point-to-Point Tunneling Protocol (PPTP)- is used to ensure that messages transmitted from one VPN node to another are secure. Layer Two Tunneling Protocol (L2TP)- Provides data encryption, authentication, and integrity and IPSec.

END OF VPN PROJECT