Vpn

774 views
712 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
774
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Vpn

  1. 1. VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan
  2. 2. INTRODUCTION What is a VPN?
  3. 3. Introduction: What is a VPN? <ul><li>Virtual </li></ul><ul><li>Private </li></ul><ul><li>Network </li></ul>
  4. 4. Introduction to VPN
  5. 5. Introduction (continued): <ul><li>Four Categories: </li></ul><ul><ul><li>Trusted VPN </li></ul></ul><ul><ul><li>Secure VPN </li></ul></ul><ul><ul><li>Hybrid VPN </li></ul></ul><ul><ul><li>Provider-provisioned VPN </li></ul></ul>
  6. 6. VPN TOPOLOGY How does a VPN work?
  7. 7. VPN Topology: Types of VPNs <ul><li>Remote access VPN </li></ul><ul><li>Intranet VPN </li></ul><ul><li>Extranet VPN </li></ul>
  8. 8. VPN Topology: Remote Access VPN
  9. 9. VPN Topology: Intranet VPN
  10. 10. VPN Topology: Extranet VPN
  11. 11. VPN Topology: Advantages and Disadvantages of VPN <ul><li>Advantages: </li></ul><ul><ul><li>Greater scalability </li></ul></ul><ul><ul><li>Easy to add/remove users </li></ul></ul><ul><ul><li>Reduced long-distance telecommunications costs </li></ul></ul><ul><ul><li>Mobility </li></ul></ul><ul><ul><li>Security </li></ul></ul>
  12. 12. VPN Topology: Advantages and Disadvantages of VPN <ul><li>Disadvantages </li></ul><ul><ul><li>Lack of standards </li></ul></ul><ul><ul><li>Understanding of security issues </li></ul></ul><ul><ul><li>Unpredictable Internet traffic </li></ul></ul><ul><ul><li>Difficult to accommodate products from different vendors </li></ul></ul>
  13. 13. VPN Topology: What is needed? <ul><li>Existing hardware (Servers, workstations,…) </li></ul><ul><li>Internet connection </li></ul><ul><li>VPN - Router/Switch </li></ul><ul><li>Software to create and manage tunnels </li></ul><ul><li>Security Device such as firewall </li></ul>
  14. 14. VPN Topology: How it works <ul><li>Operates at layer 2 or 3 of OSI model </li></ul><ul><ul><li>Layer 2 frame – Ethernet </li></ul></ul><ul><ul><li>Layer 3 packet – IP </li></ul></ul><ul><li>Tunneling </li></ul><ul><ul><li>allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet </li></ul></ul><ul><ul><li>to ensure data security against unwanted viewers, or hackers. </li></ul></ul>
  15. 15. VPN COMPONENTS What are the components of VPN?
  16. 16. VPN Components <ul><li>Protocols </li></ul><ul><li>Security </li></ul><ul><li>Appliances </li></ul>
  17. 17. VPN Components: Protocols <ul><li>IP Security (IPSec) </li></ul><ul><ul><li>Transport mode </li></ul></ul><ul><ul><li>Tunnel mode </li></ul></ul><ul><li>Point-to-Point Tunneling Protocol (PPTP) </li></ul><ul><ul><li>Voluntary tunneling method </li></ul></ul><ul><ul><li>Uses PPP (Point-to-Point Protocol) </li></ul></ul>
  18. 18. VPN Components: Protocols <ul><li>Layer 2 Tunneling Protocol (L2TP) </li></ul><ul><ul><li>Exists at the data link layer of OSI </li></ul></ul><ul><ul><li>Composed from PPTP and L2F (Layer 2 Forwarding) </li></ul></ul><ul><ul><li>Compulsory tunneling method </li></ul></ul>
  19. 19. Example of packet encapsulation
  20. 20. VPN Components: Security <ul><li>Encryption </li></ul><ul><ul><li>Technique for scrambling and unscrambling information </li></ul></ul><ul><ul><li>Unscramble – called clear-text </li></ul></ul><ul><ul><li>Scrambled information – cipher-text </li></ul></ul>
  21. 21. VPN Components: Security <ul><li>Keys </li></ul><ul><ul><li>Secret code that the encryption algorithm uses to create a unique version of cipher-text </li></ul></ul><ul><ul><li>8-bits keys = 256 combinations or two to the eighth power </li></ul></ul><ul><ul><li>16-bits keys = 65,536 combinations or two to the 16 th power </li></ul></ul><ul><ul><li>56-bits keys = 72,057,594,037,927,900 or two to the 56 th power </li></ul></ul><ul><ul><li>168-bits keys … </li></ul></ul>
  22. 22. VPN Components: Security <ul><li>Authentication </li></ul><ul><ul><li>Determine if the sender is the authorized person and if the data has been redirect or corrupted </li></ul></ul><ul><ul><li>User/System Authentication </li></ul></ul><ul><ul><li>Data Authentication </li></ul></ul>
  23. 23. VPN Components: Appliances <ul><li>Intrusion detection firewalls </li></ul><ul><ul><li>Monitors traffic crossing network parameters and protects enterprises from unauthorized access </li></ul></ul><ul><ul><li>Packet-level firewall checks source and destination </li></ul></ul><ul><ul><li>Application-level firewall acts as a host computer between the organization’s network and the Internet </li></ul></ul>
  24. 24. VPN PRODUCTIVITY AND COST BENEFITS How can companies benefit from VPN?
  25. 25. VPN Productivity and Cost Benefits: Benefits <ul><li>Extends geographic connectivity </li></ul><ul><li>Boosts employee productivity </li></ul><ul><li>Improves Internet security </li></ul><ul><li>Scales easily </li></ul>
  26. 26. VPN Productivity and Cost Benefit: Costs <ul><li>Costs associated with implementing VPN </li></ul><ul><ul><li>In House implementation </li></ul></ul><ul><ul><li>Outsourced implementation </li></ul></ul><ul><ul><li>Middle Ground implementation </li></ul></ul>
  27. 27. QUALITY OF SERVICE (QoS) WHAT IS QoS?
  28. 28. What is QoS?
  29. 29. VPN Productivity and Cost Benefits: Quality of Service <ul><li>Question: “Do I get acceptable response times when I access my mission critical applications from a remote office?” </li></ul>
  30. 30. QoS Options <ul><li>Two models are available for QoS functionality: </li></ul><ul><ul><li>Differentiated Services Model (DiffServ) </li></ul></ul><ul><ul><li>Integrated Services Model (IntServ) </li></ul></ul>
  31. 31. Differentiated Services Model (DiffServ)
  32. 32. Integrated Services Model (IntServ)
  33. 33. THE FUTURE OF VPN Where is VPN headed?
  34. 34. Future of VPN <ul><li>VPN popularity </li></ul><ul><ul><li>Companies choosing VPN </li></ul></ul><ul><ul><li>Cost efficient? </li></ul></ul><ul><ul><li>New way of communicating? </li></ul></ul>
  35. 35. Future of VPN: Companies with VPN
  36. 36. CONCLUSION Any questions?

×