Download presentation
Presentation is loading. Please wait.
Published byAnnabelle Sutton Modified over 8 years ago
1
VPN’s Andrew Stormer COSC 356 Fall 2004
2
What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private networks over a public network Connects two or more private networks over a public network Uses an encrypted tunnel Uses an encrypted tunnel Offer same security and encryption features of private networks. Offer same security and encryption features of private networks.
3
History of VPN’s Began in 1995 Began in 1995 Automotive Industry Action Group Automotive Industry Action Group Fulfill need for secure and efficient communication between parties Fulfill need for secure and efficient communication between parties
4
Tunneling One network sends via 2 nd network connection One network sends via 2 nd network connection Encapsulate protocol within packets Encapsulate protocol within packets PPTP PPTP IPSec IPSec L2TP L2TP
5
PPTP Point-to-Point Tunneling Protocol Point-to-Point Tunneling Protocol Combination of PPP & TCP/IP Combination of PPP & TCP/IP Encapsulates information within IP packets Encapsulates information within IP packets
6
IPSec Internet Protocol Security Internet Protocol Security Developed by IETF Developed by IETF Secures OSI Layer 3 Secures OSI Layer 3 IPv4 & IPv6 compatible IPv4 & IPv6 compatible
7
L2TP Layer Two Tunneling Protocol Layer Two Tunneling Protocol Expansion of PPP Expansion of PPP Endpoints reside on different devices Endpoints reside on different devices Devices connected via packet switching Devices connected via packet switching
8
Encryption Data is encrypted at source Data is encrypted at source Decrypted at destination Decrypted at destination 3DES 3DES
9
3DES Triple Data Encryption Standard Triple Data Encryption Standard Expanded from DES in 1998 Expanded from DES in 1998 Uses DES algorithm 3 times Uses DES algorithm 3 times
10
Categories Hardware based Hardware based –encrypting routers Firewall based Firewall based –most secure Standalone application packages Standalone application packages –sometimes used to enhance hardware solutions
11
Features Support basic LAN interface Support basic LAN interface Authorization & encryption Authorization & encryption Data compression Data compression Routing ability Routing ability Network address translation Network address translation
12
VPN vs. Extranet VPN vs. Extranet Allow full access to company network neighborhood Allow full access to company network neighborhood Normal log-in information Normal log-in information Extremely regulated access to portion of intranet. Extremely regulated access to portion of intranet. Issuance of digital certificates Issuance of digital certificates
13
Benefits Reduce long-distance phone costs Reduce long-distance phone costs No long-term contracts No long-term contracts Offers flexibility to small and medium sized businesses Offers flexibility to small and medium sized businesses
14
Security Same security and encryption features as a private network. Same security and encryption features as a private network. Most secure connection when using a wireless device Most secure connection when using a wireless device
15
Setup a VPN Connection
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.