Virtual Private Network(VPN) Presented By Aparna Chilukuri.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Kapitel 7: Securing Site-to-Site Connectivity
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
CS682 – Network Management and Security Session 7.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Chapter 7: Securing Site-to-Site Connectivity
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Virtual Private Network
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Secure Socket Layer (SSL)
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
The University of Oklahoma Virtual Private Network How it works.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Network (VPN)
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Network Access for Remote Users Dr John S. Graham ULCC
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Securing Access to Data Using IPsec Josh Jones Cosc352.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
VPN: Virtual Private Network
Virtual Private Network zswu
Presentation transcript:

Virtual Private Network(VPN) Presented By Aparna Chilukuri

What is a VPN? A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.

What Makes a VPN? Remote Access Site-to-Site Intranet Extranet Secure VPN Trusted VPN Hybrid VPN Provider-Provisioned VPN

VPN Security  authentication—ensuring that the data originates at the source that it claims  access control—restricting unauthorized users from gaining admission to the network  confidentiality—preventing anyone from reading or copying data as it travels across the Internet  data integrity—ensuring that no one tampers with data as it travels across the Internet

What is Tunneling ? Tunneling is the process of placing an entire packet within another packet and sending it over a network. Tunneling requires three different protocols:  Carrier protocol  Encapsulating protocol - GRE, IPSec, L2F, PPTP, L2TP  Passenger protocol - IPX, NetBeui, IP

VPN Protocols Remote Access PPTP(Point -to -Point Tunneling Protocol) L2F(Layer 2 forwarding) L2TP( Layer 2 tunneling Protocol) Lan-to-Lan IPSec

IPSec Uses  Diffie-Hellman key exchanges to deliver secret keys between peers on a public net  public-key cryptography for signing Diffie-Hellman exchanges, to guarantee the identities of the two parties and avoid man-in-the-middle attacks  data encryption standard (DES) and other bulk encryption algorithms for encrypting data  keyed hash algorithms (HMAC, MD5, SHA) for authenticating packets digital certificates for validating public keys

Conclusion Loopholes –Hackers will try to "piggyback" onto an existing VPN connection that a remote worker has established, either inserting viruses into a system or removing and viewing sensitive files