Virtual Private Networks Ed Wagner CS 7493. Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Internet Protocol Security (IPSec)
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
K. Salah1 Security Protocols in the Internet IPSec.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Module 5: Configuring Access for Remote Clients and Networks.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
K. Salah1 Security Protocols in the Internet IPSec.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Jonathan Brewer Technical Director Araneo Wireless Solutions Layer 3 Tunnels for Broadband Delivery.
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Chapter 18 IP Security  IP Security (IPSec)
VPN: Virtual Private Network
Examining Network Protocols
Virtual Private Network (VPN)
Virtual Private Networks
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Chapter 8 – Data switching and routing
Presentation transcript:

Virtual Private Networks Ed Wagner CS 7493

Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion

Introduction Virtual Private Network o a secure network that uses primarily public telecommunication infrastructures, such as the internet, to provide remote offices or traveling users an access to a centralized organizational network.

Types of VPNs PPTP IPSEC L2TP OpenVPN (SSL) Hybrid VPN MPLS VPN

PPTP Point to Point Tunneling Protocol o The most common and widely used VPN. o Defined in RFC 2637, in 1999 o Developed by Microsof and 3com. o PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. o PPTP does not specified encryption or authentication.  Security and authentication provided by the Microsoft PPTP software stack. o Authentication and Encryption  Authentication - MS-CHAPv2  Encryption - Microsoft Point to Point Encryption (MPPE) - RC4 stream cipher

PPTP Pros/Cons of PPTP + Cheap to setup - not as secure + pre-existing technology- security not native

IPSEC Internet Protocol Security Protocol o a protocol suite for securing IP communications by authenticating and encrypting each IP packet. o Developed at the Naval Research Lab. o Operates in the OSI layer 3, much lower than other VPN protocols. o 2 modes of transmission:  Tunnel - entire packet is encrypted, then encapsulated in a new ip packet. used in network to network vpns, and host to network vpn NAT transversal  Transport - Only the payload of the IP packet is encrypted o When the authentication header effects routing, use NAT-T

IPSEC Pros/Cons of IPSEC + Highest security + when used with l2tp, data is encapsulated twice. - harder to setup - possible routing issues - requires more processing power

L2TP Layer 2 Tunneling Protocol o a tunneling protocol used to support vpns. o does not provide any encryption or authentication  usually used encrypted with IPsec. o Proposed in 1999, RFC 2661 o Entire packet, both header and payload are sent as a UDP packet on port 1701.

L2TP Pros/Cons of L2TP + native windows support + feature rich backend allows use of other protocols - No native security - slower than other vpn sources

OpenVPN An open source software applications that implements VPN techniques for creating secure point to point or site to site connections in routed/bridged networks Created in 2002, by James Yonan Uses SSL for encryption Authentication is done with pre-shared keys

OpenVPN Pros/Cons of OpenVPN + great community support + free + easy to setup - SSL can require more processing power.

Hybrid VPNs Hybrid VPN servers are able to accept connections from multiple types of VPN clients. For example, combining the features of SSL and IPSEC

Hybrid VPNS Pros/Cons of Hybrid + Ability to use different protocols to provide greater usage. - expensive to implement.

MPLS VPN Multi-Protocol Label Switching o a family of methods for harnessing the power of multiprotocol label switching to create VPNs. o MPLS VPNs give network engineers the flexibility to transport and route several types of network traffic using the technologies of a MPLS backbone  Related to telecommunication standards

MPLS Pros/Cons of MPLS + use of different network technologies to provide a VPN network. - Not easy to setup.

Encrypting and Tunneling Encrypting o Encoding a packet of information using a known and tested algorithm. o Ex: IPsec, MPPE Tunneling o Creating a path where all packets are routed to the next path in the circuit, whether encrypted or not. o Ex: L2TP, PPTP (not with MPPE)

Conclusion There are various options for VPNs. The major factors for an SA setting up a VPN network would be the Needs for Mobility, the complexity of security, and the expense that will be used to implement the VPN

Questions?

Works cited