Download presentation
Presentation is loading. Please wait.
Published byMarilyn Powell Modified over 9 years ago
1
By Kevin Stevens UAT NTS4150
2
Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public networks
3
Hardware – A dedicated appliance specifically for use as a VPN. -High performance -Quick implementation for large scale deployment Examples: SonicWALL NSA E8500
4
Software – Software based VPN that can be installed on existing infrastructure. -Lower capex (Possibly free) -Better compatibility with mixed environments Examples: OpenVPN, OpenSwan
5
Cost efficient compared to dedicated lines Ability to secure traffic through public networks Faster deployment than other solutions
6
No control over Internet bandwidth Increase in network administration Incompatibility issues Can open remote vectors of attack
7
Remote Access – establishes a remote connection on a client/server basis. Typically seen with telecommuters. Network to network (site to site) – connects remote offices via end points.
8
IPSec – Operates at the network layer. Provides functionality to encrypt and authenticate IP data. PPTP – Point-to-Point tunneling protocol. Operates at the Data link layer. Uses PPP to encapsulate data. L2TP – Layer 2 Tunneling Protocol. Operates at the Data link layer. Uses PPP to encapsulate data. A combination of L2F and PPTP. SSL – Works at different levels of the OSI, giving it flexibility.
9
VPN’s can be setup with a myriad of encryption schemes. Here are some of the basics: PPP – can provide encryption through Microsoft's Point-to-Point Encryption Protocol (MPPE). MPPE uses the RSA RC4 encryption algorithm. IPsec – provides encryption through the Encapsulating Security Payload (ESP). Supports various encryption algorithms. SSL/TLS – provides a variety of encryption algorithms.
10
The Virtual Private Network Consortium only supports the following secure VPN technologies: IPsec with encryption L2TP inside of IPsec SSL with encryption
11
Krutz L., R., & Vines, R. D. (2007). The CISSP and CAP Prep Guide. Indianapolis: Wiley Publishing. Merkow, M., & Breithaupt, J. (2006). Information Security Principles and Practice. Upper Saddle River: Prentice Hall. Northcutt, S., Zeltser, L., Winters, S., & Kent, K. R. (2005). Inside Network Security. Sams Publishing. VPN Technologies: Definitions and Requirements. (n.d.). Retrieved November 28, 2010, from http://www.vpnc.org/vpn-technologies.html http://www.vpnc.org/vpn-technologies.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.