Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
Computer Net Lab/Praktikum Datenverarbeitung 2 1 Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Networks
Examining Network Protocols
Virtual Private Network (VPN)
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings

Virtual Private Network Logical Solution For Remote Access Secure Communications Tailored To Individuals Enhancing Productivity Increase Flexibility Reduce Costs of Communications

Classification based on protocols PPTP L2TP PPTP protocol and L2TP protocol are in the second layer of OSI model, so they are also called layer second tunneling protocol. IPSec IPSec is layer third tunneling protocol, which is the most common protocol.

Classification based on service applications Access VPN Client-initiated VPN connection NAS-initiated VPN connection Intranet VPN An intranet VPN interconnects distributed internal points of an enterprise through public networks. Extranet VPN An extranet VPN uses a VPN to extend an enterprise network to suppliers, partners, and clients.

Classification based on devices Switch VPN Mainly applied in VPN internet, which has fewer users. Router VPN Firewall VPN The firewall VPN is the most common kind of VPN type.

Classification based on principles Overlapping VPN Overlapping VPN needs users themselves to establish VPN link between nodes. Peer-to-peer VPN Peer-to-peer VPN tunnels are established by network operators in backbone network.

Tunneling technology helped achieve VPN Three layers: First: link layer and the network layer Second: tunnel PPP connections (as PPTP, L2TP ) Third: IPinIP (IPSec)

PPTP (Point to Point Tunneling Protocol ) Remote users can access corporate networks Dial into a local ISP Via a secure link to the Internet through systems that are equipped with Point to Point Protocol

L2TP :similar to PPTP protocol, but exist differences IP networks tunnel numbers Providing functions(header compression, tunnel authentication ) drafted by different companies

IPSec (InternetProtocolSecurity ) End-to-end protection

Two types Symmetric key Cryptography The encryption and decryption keys are the same. Data Encryption Standard(DES) Triple DES International Data Encryption Algorithm (IDEA) Blowfish

Asymmetric key Cryptography The encryption key is published for someone to use and encrypt messages. However, only the receiving party has access to the decryption key. RSA Diffie-Hellman

The computing speed of symmetric-key schemes is quite faster than the computing speed of public-key encryption. DES and Triple DES are more widely used in VPN system.

Key management Key exchange Key storage Key use Symmetric keys Asymmetric keys

Challenges of key management Complex management Security issues Data availability Governance

Authentication of VPN Computer level-Authentication User level- Authentication

CISCO ANYCONNETCT SETTINGS GUIDE

Step1 Launch the Anyconnect application

Step2 A username and password

Step3 check the status of the VPN connection