Download presentation
Presentation is loading. Please wait.
Published byAlvin Hampton Modified over 8 years ago
1
Virtual Private Network Wo Yan Lam
2
Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features of VPN Advantages of using VPN
3
What is Virtual Private Network a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the private network to the remote users
4
Different types of VPN Remote-Access VPN Site-to-Site VPN
5
Remote-Access VPN User-to-LAN connection Large remote-access VPN will outsource to an enterprise service provider (ESP) ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network
6
Remote-Access VPN Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider
7
Site-to-Site VPN Use of dedicated equipment and large- scale encryption Connect multiple fixed sites over a public network 2 types of site-to-site VPN –Intranet-based –Extranet-based
8
Intranet-based Usually for corporations who have one or more remote locations Creates an intranet VPN to connect LAN to LAN
9
Extranet-based Usually between 2 different corporations They can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment
10
Security Features of VPN Internet Protocol Security Protocol (IPSec) Authentication, Authorization and Accounting Servers (AAA Servers)
11
Internet Protocol Security Protocol (IPSec) IP Tunnel –An encapsulation of one IP packet inside of another, for the purpose of simulating a physical connection between two remote networks across an intermediate network
12
Other secure VPN protocols Secure Sockets Layer (SSL) Point-to-point tunneling protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Layer 2 Tunneling Protocol Version 3 (L2TPv3) VPN-Q
13
Authentication, Authorization and Accounting Servers (AAA Servers) Used for more secure access in a remote- access VPN environment The server will check: –Who you are (authentication) –What you are allowed to do (authorization) –What you actually do (accounting)
14
Advantages Extend geographic connectivity Improve security Reduce operational costs versus traditional WAN Reduce transit time and transportation costs for remote users
15
Advantages Improve productivity Simplify network topology Provide global networking opportunities
16
References http://computer.howstuffworks.com Wikipedia.org
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.