Download presentation
Presentation is loading. Please wait.
Published byLynette Gibbs Modified over 8 years ago
1
VPN Alex Carr
2
Overview Introduction 3 Main Purposes of a VPN Equipment Remote-Access VPN Site-to-Site VPN Extranet Based Intranet Based Differences VPN Components VPN Client VPN Concentrator VPN-Enabled Firewall VPN Protocols Questions
3
Introduction A virtual private network (VPN) extends a private network across a public network This is done by establishing a virtual point to point connection through the use of dedicated connections, encryption, or a combination of the two VPN technology is also used by ordinary Internet users to connect to proxy servers for the purpose of protecting one's identity
4
3 Main Purposes of a VPN 1. Security - the VPN should be able to protect the data that is being sent over an open network. If there is a potential hacker they should not be able to read the data that is retrieved
5
3 Main Purposes of a VPN 2. Reliability - Everyone should be able to access the network all the time unless it is only open during certain hours. The network should also work properly even when there is a large number of users
6
3 Main Purposes of a VPN 3. Scalability - The VPN should be able to expand when a business becomes larger without replacing any technology.
7
Equipment 1. Network Access Server - is responsible for setting up and maintaining each tunnel in a remote-access VPN. 2. AAA server - For each VPN connection, the AAA server confirms who you are, identifies what you're allowed to access over the connection and tracks what you do while you're logged in. 3. Firewall - maintaining that the information on the private network is secure
8
Remote-access VPN Allows a user to have a secure connection with a remote computer network The two major components of a remote- access VPN are a network access server (NAS) and client software
9
Site-to-Site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the internet extends the company’s network, making their resources at their main location available to branch locations
10
Extranet-based . Extranet-based is when a company has a close relationship with another company, it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets
11
Intranet Based Intranet-based is when a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN
12
Differences Even though the purpose of a site-to-site VPN is different from that of a remote- access VPN, it could use some of the same software and equipment Ideally, though, a site-to-site VPN should eliminate the need for each computer to run VPN client software as if it were on a remote-access VPN
13
VPN Components VPN components can run alongside other software on a shared server, but this is not typical, and could put the security and reliability of the VPN at risk. However as a business's VPN needs increase, so does its need for equipment that's optimized for the VPN.
14
VPN Client VPN Client is when software is running on a device that acts as the interface for multiple connections
15
VPN Concentrator VPN concentrator replaces an AAA server installed on a generic server. The hardware and software work together to establish VPN tunnels and handle large numbers of simultaneous connections
16
VPN-Enabled Firewall VPN-enabled Firewall is a conventional firewall protecting information being sent between networks
17
VPN Protocols 1. IPsec - is a standard-based security protocol and is widely used with IPv4 and the layer 2 tunneling protocol 2. Transport Layer Security (SSL/TLS) - can tunnel an entire network's traffic or secure an individual connection 3. Secure Shell VPN - offers VPN tunneling to secure remote connections to a network or to inter- network links 4. Microsoft Point-to-Point Encryption - works with the point-to-point protocol and in several compatible implementations on other platforms
18
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.