1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Intranet, Extranet, Firewall. Intranet and Extranet.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 4: Designing Routing and Switching Requirements.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Module 5: Configuring Access for Remote Clients and Networks.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Networks
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

2 Content Introduction VPN Technologies VPN Products Advantages and Disadvantages of VPN Conclusion

3 Public vs Private Network Public Network Accessible freely to everyone, no boundaries and few rules to manage it. Problem of security Ideal medium for illegal activity

4 Public vs Private Network Private network Owned by a single corporation Gateway routers exist between private network and public network Firewall prevents intruders coming from public network

5 Limit to Private Network Separate branches or offices Need for remote access Traditional method—using leased lines, not flexible and expensive

6 Solution: Virtual Private Network (VPN) Definition: a way to simulate a private network over a public network (Internet) Allow creation of a secure, private network over a public network such as the Internet Done through IPSec (IP Security Protocol), encryption, packet tunneling, and firewalls

7 Functions provided by VPN Authentication: ensuring that the data originates at the source that it claims access control: restricting unauthorized users from gaining admission to the network Confidentiality: preventing anyone from reading or copying data as it travels across the Internet data integrity: ensuring that no one tampers with data as it travels across the Internet

8 An Important property of VPN Virtual means dynamic—Network formed logically, no permanent links. When connection no longer needed the links is torn down—bandwidth saved.

9 How to create tunnels A tunnel is a virtual connection between locations that are connected in a VPN Host A generates an IP packet with the destination address of Host B The packet is routed to a firewall or secure router at the boundary of A’s network. The firewall filters all packets to determine the need for IPSec processing.

10 How to create a tunnel(cont) The packet is now routed to B’s firewall After detected the packet is delivered to B

11 IP Security Protocols (IPSec) IPSec is a protocol suite  a set of IP extensions that provide security services at the network level. IPSec technology is based on modern cryptographic technologies, making very strong data authentication and privacy guarantees possible.

12 IPSec functions Three facilities provided by IPSec Authentication-only Authentication/encryption Key exchange

13 Other protocols for VPN Point to point tunnel protocol (PPTP) Layer-2 forwarding (L2F) Layer-2 tunneling protocol (L2TP)

14 VPN Products Hardware-based system Encrypting routers Secure and easy to use Not flexible Firewall-based system Using farewall’s security system Restrict the access to the internal network Performance not as good as hard-ware based

15 VPN Product (cont) Software-based system, ideal when Both ends not controlled by the same corp. Different firewalls and routers implemented within the same system Harder to manage than encrypting routers

16 Advantages of VPN Lower cost Remote access Platform independent Can be used both as extranet and intranet

17 Disadvantages of VPN Lower bandwidth available compared to dial-in line Inconsistent remote access performance due to changes in Internet connectivity No entrance into the network if the Internet connection is broken

18 Conclusion The driving force for VPN is the requirement to make more secure information communication and to decrease the communication cost IPSec is the mostly used protocols for VPN

19 References 1. Virtual private networks: making the right connection, Dennis Fowler, San Francisco, CA, Morgan Kaufmann Publishers, 1999;