Download presentation
Published bySamantha Ethel George Modified over 9 years ago
2
FINAL YEAR PROJECT
3
IMPLEMENTATION OF VPN USING IPSEC
4
GROUP MEMBERS M.UZAIR NASIR 2K5-CSE-153 AHSAN EJAZ 2K5-CSE-163
RANA.M.KAMRAN 2K5-CSE-164 HUMAYUN KHAN K5-CSE-169
5
VPN To Create a Secure tunnel over the public network (internet) is called Virtual Private Network
6
VPN Types Overlay VPN Peer-to-Peer VPN Layer 2 VPN Layer 3 VPN
L2TP Layer 3 VPN IPSec GRE Tunneling Peer-to-Peer VPN MPLS VPN
7
IPSec VPN IPSec is a set of security protocols and algorithms used to secure data at the network layer
8
WHY WE USE IPSEC? IP Packets have no inherent security
No Way To Verify The claimed sender is a true sender The data has not been modified in transit The data has not been viewed by third party IP sec Provide Automated Solution for these areas
9
IPSec Security Features
Data Confidentiality Data Integrity Data origin Authentication
10
IPSec Protocols IPSec uses two main protocols to create a security framework Encapsulating Security Payload (ESP) Authentication Header (AH)
11
IPSec VPN We can implement IPSec VPN in different Scenario
Site-to-Site VPN Remote Access VPN
12
Flow Diagram: Start connectivity Data security problem Different vpn
Vpn ipsec Site-to-site vpn Remote vpn End
13
IMPLEMENTATION 1st scenario
PROBLEM Site Site2 DATA DATA INTERNET THIS IS A HUGE PROBLEM Data is viewed by third party HACKER
14
IMPLEMENTATION 1st scenario
SOLUTION Site Site2 INTERNET DATA DATA VPN TUNNEL Third party is unable to view data HACKER
15
IMPLEMENTATION 2ND scenario
REMOTE VPN Site INTERNET VPN LAPTOP (MOBILE USER)
16
TOOLS Routers (security IOS) VPN Concentrator Sniffer (ethereal)
17
ADVANTAGES Cost Effective No Additional Equipment Required
No Distance Limitation
18
ANY QUESTION??
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.