VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Remote Desktop Connection Techniques Wireless Communication Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networks Ba 378 Winter What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer.
Virtual Private Networking Karlene R. Samuels COSC513.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
VPN: Virtual Private Network
Virtual Private Network (VPN)
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com

Traditional Connectivity [From Gartner Consulting] clicktechsolution.com

What is VPN?  Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  Became popular as more employees worked in remote locations.  Terminologies to understand how VPNs work. clicktechsolution.com

Private Networks vs. Virtual Private Networks  Employees can access the network (Intranet) from remote locations.  Secured networks.  The Internet is used as the backbone for VPNs  Saves cost tremendously from reduction of equipment and maintenance costs.  Scalability clicktechsolution.com

Remote Access Virtual Private Network (From Gartner Consulting) clicktechsolution.com

Brief Overview of How it Works Two connections – one is made to the Internet and the second is made to the VPN. Two connections – one is made to the Internet and the second is made to the VPN. Datagrams – contains data, destination and source information. Datagrams – contains data, destination and source information. Firewalls – VPNs allow authorized users to pass through the firewalls. Firewalls – VPNs allow authorized users to pass through the firewalls. Protocols – protocols create the VPN tunnels. Protocols – protocols create the VPN tunnels. clicktechsolution.com

Four Critical Functions  Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered clicktechsolution.com

Encryption EEEEncryption -- is a method of “scrambling” data before transmitting it onto the Internet. PPPPublic Key Encryption Technique DDDDigital signature – for authentication

Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] Two types of end points:  Remote Access  Site-to-Site clicktechsolution.com

Four Protocols used in VPN  PPTP -- Point-to-Point Tunneling Protocol  L2TP -- Layer 2 Tunneling Protocol  IPsec -- Internet Protocol Security  SOCKS – is not used as much as the ones above clicktechsolution.com

VPN Encapsulation of Packets clicktechsolution.com

Types of Implementations  What does “implementation” mean in VPNs?  3 types  Intranet – Within an organization  Extranet – Outside an organization  Remote Access – Employee to Business clicktechsolution.com

Virtual Private Networks (VPN) Basic Architecture clicktechsolution.com

Device Types  What it means  3 types  Hardware  Firewall  Software clicktechsolution.com

Device Types: Hardware  Usually a VPN type of router Pros Highest network throughput Plug and Play Dual-purpose Cons Cost Lack of flexibility clicktechsolution.com

Device Types: Firewall  More security? Pros “Harden” Operating System Tri-purpose Cost-effective Cons Still relatively costly clicktechsolution.com

Device Types: Software  Ideal for 2 end points not in same org.  Great when different firewalls implemented Pros Flexible Low relative cost Cons Lack of efficiency More labor training required Lower productivity; higher labor costs clicktechsolution.com

Advantages VS. Disadvantages clicktechsolution.com

 Eliminating the need for expensive long-distance leased lines  Reducing the long-distance telephone charges for remote access.  Transferring the support burden to the service providers  Operational costs  Cisco VPN Savings Calculator Cisco VPN Savings Calculator Cisco VPN Savings Calculator Advantages: Cost Savings clicktechsolution.com

 Flexibility of growth  Efficiency with broadband technology Advantages: Scalability clicktechsolution.com

VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology Disadvantages clicktechsolution.com

Applications: Site-to-Site VPNs Large-scale encryption between multiple fixed sites such as remote offices and central offices Network traffic is sent over the branch office Internet connection This saves the company hardware and management expenses clicktechsolution.com

Site-to-Site VPNs clicktechsolution.com

Applications: Remote Access  Encrypted connections between mobile or remote users and their corporate networks  Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server.  Ideal for a telecommuter or mobile sales people.  VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable clicktechsolution.com

Industries That May Use a VPN  Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider  Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely  Retail: able to securely transfer sales data or customer info between stores & the headquarters  Banking/Financial: enables account information to be transferred safely within departments & branches  General Business: communication between remote employees can be securely exchanged clicktechsolution.com

Statistics From Gartner- Consulting* *Source: clicktechsolution.com

Some Businesses using a VPN CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN ITW Foilmark secured remote location orders, running reports, & internet/intranet communications w/ a 168-bit encryption by switching to OpenReach VPN Bacardi & Co. Implemented a 21-country, 44- location VPN clicktechsolution.com

Where Do We See VPNs Going in the Future? VPNs are continually being enhanced. Example: Equant NV Example: Equant NV As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. Networks are expected to converge to create an integrated VPN Improved protocols are expected, which will also improve VPNs. clicktechsolution.com

Pop Quiz! VPN stands for… a) Virtual Public NetworkVirtual Public Networkb) Virtual Private NetworkVirtual Private Network c) Virtual Protocol NetworkVirtual Protocol Network d) Virtual Perimeter NetworkVirtual Perimeter NetworkQ.1 clicktechsolution.com

Pop Quiz! A.1 b) Virtual Private NetworkVirtual Private Network VPN stands for… VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only "virtually" private, however, because this data actually travels over shared public networks instead of fully dedicated private connections. clicktechsolution.com

Pop Quiz! What are the acronyms for the 3 most common VPN protocols? Q.2 clicktechsolution.com

Pop Quiz! A.2 PPTP L2TP IPsec 3 most common VPN protocols are… PPTP, IPsec, and L2TP are three of today's most popular VPN tunneling protocols. Each one of these is capable of supporting a secure VPN connection. clicktechsolution.com

Pop Quiz! What does PPTP stand for? Q.3 clicktechsolution.com

Pop Quiz! A.3 PPTP = Point-to-Point Tunneling Protocol ! clicktechsolution.com

Pop Quiz! What is the main benefit of VPNs compared to dedicated networks utilizing frame relay, leased lines, and traditional dial-up? Q.4 a) better network performancebetter network performanceb) less downtime on averageless downtime on average c) reduced costreduced costd) improved securityimproved security clicktechsolution.com

Pop Quiz! A.4 c) reduced costreduced cost The main benefit of VPNs is… The main benefit of a VPN is the potential for significant cost savings compared to traditional leased lines or dial up networking. These savings come with a certain amount of risk, however, particularly when using the public Internet as the delivery mechanism for VPN data. clicktechsolution.com

Pop Quiz! In VPNs, the term "tunneling" refers to Q.5 a) an optional feature that increases network performance if it is turned onincreases network performance if it is turned on b) the encapsulation of packets inside packets of a different protocol to create and maintain the virtual circuitthe encapsulation of packets inside packets of a different protocol c) the method a system administrator uses to detect hackers on the networkto detect hackers on the network d) a marketing strategy that involves selling VPN products for very low prices in return for expensive service contractsa marketing strategy clicktechsolution.com

Pop Quiz! A.5 b) the encapsulation of packets inside packets of a different protocol to create and maintain the virtual circuitthe encapsulation of packets inside packets of a different protocol In VPNs, the term "tunneling" refers to… clicktechsolution.com