Download presentation
Presentation is loading. Please wait.
1
Virtual Private Networks Ba 378 Winter 2006
2
What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer mechanism. It also attempts to maintain security during transfer of information The most common configuration is to have a single main internal network with remote nodes using VPN to gain full access to the central net. The remote nodes are commonly remote offices or employees working from home. You can also link two small (or large) networks to form an even larger single network. http://www.tldp.org/HOWTO/VPN-HOWTO/x192.html
3
VPNs as islands VPNs work like islands The ocean can be seen as the internet To get to each island a bridge must be built, even though it may be costly at first hand. It is beneficial in the end. (Leased Lines) Submarines are given to each person who attain a leased line. Each remote member can communicate in a safe and reliable manner. http://www.alliancedatacom.com/how-vpn-works.asp
4
TYPES OF VPN’S Remote Access VPN Site to Site VPN - Intranet VPN - Extranet VPN 2 Common Types
5
Remote Access VPN “Virtual Private dial-up network” User to LAN connection Enables employees to connect to private network from remote locations What is it? http://computer.howstuffworks.com/vpn2.htm
6
Remote Access VPN Company out sources to an enterprise service provider (ESP) ESP sets up a network access server (NAS) Telecommuters receive desktop client software for computer Employees dial toll free number on computer to connect to NAS and use client software to tap into company network How does it work? http://computer.howstuffworks.com/vpn2.htm
7
Site to Site VPN Intranet-based - One or more remote locations connect to a single private network -Connects LAN to LAN Extranet-based -Close relationship with another company -Connects LAN to LAN -Various companies can work in shared environment What is it and How does it work? http://computer.howstuffworks.com/vpn3.htm
8
3 VPN TYPES http://computer.howstuffworks.com/vpn2.htm
9
VPN Security With VPN now expanding not only through businesses but through out the globe and connecting several businesses together through LANs, WANs, and Wireless networks, security is more important than ever
10
Integrated Security Systems An integrated system provides greater risk reduction than any individual product or combination security devices, regardless of features or performance. Using the network to provide a common security architecture: reduces complexity enables tighter integration closes risk gaps provides greater visibility of end-to-end security http://www.cisco.com/en/US/products/hw/vpndevc/products_category_technologies_overview.html
11
Well designed VPNs incorporate the following characteristics: Integrated: Every element of the network acts as a point of defense including software and hardware Collaborative: Various network components work together to provide a means of protection. Security involves cooperation between endpoints, network elements, and policy enforcement Adaptive: The system can recognize new threats as the arrive. Mutual awareness can exist among and between security services and network intelligence, thus increasing security effectiveness to new threats. http://www.cisco.com/en/US/products/hw/vpndevc/products_category_technologies_overview.html
12
VPN Security Methods A well designed VPN uses several methods for keeping the connection and data secure, these are some of them: Firewalls Encryption IPSec AAA Servers http://computer.howstuffworks.com/vpn.htm
13
Firewall “A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.” http://computer.howstuffworks.com/vpn.htm
14
Firewall Firewalls are an important part of the security system because they will help stop hackers, viruses, spyware, and other harmful things that are associated with the internet from entering the company’s computer system. http://computer.howstuffworks.com/vpn.htm
15
Encryption “Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode.” Most computer systems use one of the following: Symmetric-key encryption Public-key encryption http://computer.howstuffworks.com/vpn.htm
16
Symmetric-key encryption Each computer has a secret key that it can use to encrypt information before it is sent over the network to another computer Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message. http://computer.howstuffworks.com/vpn.htm
17
Example “You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.” http://computer.howstuffworks.com/vpn.htm
18
Public-key encryption This encryption uses a combination of a private key and a public key The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key http://computer.howstuffworks.com/vpn.htm
19
Public-key encryption The most popular public-key encryption is called Pretty Good Privacy (PGP) This program lets you encrypt just about anything. ie email, hard drives, media, etc. For more information PGPPGP http://computer.howstuffworks.com/vpn.htm
20
IPSec IPSec stands for Internet Protocol Security Protocol It provides enhanced security features such as better encryption algorithms and more comprehensive authentication There are two types of encryption: tunneling and transport http://computer.howstuffworks.com/vpn.htm
21
Tunneling and transporting Tunneling encryption encrypts each packet that is sent Transport encryption encrypts the entire package as a whole that is sent http://computer.howstuffworks.com/vpn.htm
22
Photo courtesy Cisco Systems, Inc. A remote-access VPN utilizing IPSec http://computer.howstuffworks.com/vpn.htm Overview of a VPN and its security points
23
AAA Servers AAA stands for authentication, authorization and accounting These servers are used for a more secure access for remote-access VPN environments http://computer.howstuffworks.com/vpn.htm
24
AAA Servers When a AAA server gets a request to establish a session, it asks the following questions: Who you are (authentication)? What you are allowed to do (authorization)? What you actually do (accounting)? http://computer.howstuffworks.com/vpn.htm
25
Who uses VPNs? Companies and organizations –Employees work at home or traveling Retail sector –Usually have multiple sites Universities –Allow students and faculty to access information off site
26
Providers of VPNs Company can build own –Purchase software –Use of a router Can outsource –Mostly internet service providers (ISPs) and interexchange carriers (IXCs) –Less managing and logistics involved http://compnetworking.about.com/gi/dynamic/offsite.htm?site=http%3A%2F%2Fwww.informationweek.com%2F780% 2Fvpn.htm http://www.techsoup.org/howto/articles/networks/page1352.cfm?cg=searchterms&sg=Virtual%20Private%20Network
27
How much does VPNs cost? Prices vary by each provider Additional options available such as network management, user authentication, firewalls, encryption Savings – Infonetics reports $1,000 average savings per remote worker per year –Cisco’s study states savings of $600 to $1,800 per remote worker per year. http://www.bcr.com/architecture/remote_access/do-it-yourself_vpns_20020519302.htm
28
Pros and Cons of VPNs Price Vs. Added-Value Added-Value –Efficiency –Security –Geographic Distance –Satisfaction Poor Maintenance
29
Components of a good VPN A Good VPN Should… Security It must offer security to the users while accessing their data. Maintenance It should be updated and maintained within the means of the company. Efficiency The VPN needs to add to the productivity and quality of the company. Reliability It should be a network that can be counted-on. Price The benefits must outweigh the costs of the VPN. Breadth It should span far enough to meet the needs of the company. Alignment The VPN must enhance and compliment the goals of the company.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.