Vpn rsvp

763 views

Published on

VIRTUAL PRIVATE NETWORK-

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
763
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Vpn rsvp

  1. 1. Virtual Private Networks By RSVP’s
  2. 2. What is a VPN? <ul><li>A virtual network overlaid on top of the ubiquitous interconnection of the Internet </li></ul><ul><li>and a private network for confidential communications and exclusive usage. </li></ul>
  3. 3. VPNs <ul><li>In a virtual private network (VPN), &quot; virtual &quot; implies that there is no physical network infrastructure dedicated to the private network. </li></ul><ul><li>Instead, a single physical network infrastructure is shared among various logical networks </li></ul><ul><li>In VPNs, various networking technologies are applied toward the goal of providing private communications within the public Internet infrastructure </li></ul>
  4. 4. Private Networks   Separate Private Networks.
  5. 5. Why VPNs? <ul><li>Separate private networking solutions are expensive and cannot be updated quickly to adapt to changes in business requirements. </li></ul><ul><li>The Internet is inexpensive but does not by itself ensure privacy. </li></ul>
  6. 6. The Internet Virtual Private Networking: the collection of technologies applied to a public network—the Internet—to provide solutions for private networking needs.
  7. 7. <ul><li>Ubiquitous Coverage - wider coverage compared with the private data network infrastructures offered by telecommunication providers </li></ul><ul><li>Cost Reduction - based on the system's economy of scale </li></ul><ul><li>Security – using cryptographic technology </li></ul><ul><li>E-Commerce - VPNs provide both interconnectivity and security. </li></ul>VPN Motivation
  8. 8. The VPN MarketPlace <ul><li>VPN Products : Hardware and Software that make VPNs possible </li></ul><ul><ul><li>A VPN gateway is a stand-alone device that enables authorized access to the protected network resources. The resources are not located on the same physical device with the VPN gateway </li></ul></ul><ul><ul><li>A VPN client , on the other hand, is installed on the same network device it is supposed to protect. Usually, the client is a software package installed on the host computer. </li></ul></ul>
  9. 9. The VPN MarketPlace <ul><li>VPN SERVICES : </li></ul><ul><ul><li>Contracted VPN service </li></ul></ul><ul><ul><li>Service level agreements (SLAs) </li></ul></ul>
  10. 10. VPN Barriers <ul><li>Lack of interoperability of IPSec* implementations. </li></ul><ul><li>???????? </li></ul><ul><li>Lack of widely used quality of service (QoS) standards, as well as the sparse deployment of QoS-capable infrastructures </li></ul><ul><li>Security services in support of VPNs must be constructed from additional hardware and software components as Internet infrastructure is still largely focused on providing connectivity and does not yet offer services beyond connectivity. </li></ul>* IPSec: Internet Security standards established by IAB
  11. 11. VPN Technologies <ul><li>Tunneling – using encapsulation </li></ul><ul><li>Authentication </li></ul><ul><li>Access Control </li></ul><ul><li>Data Security </li></ul>
  12. 12. VPN Solutions <ul><li>VPN solution consists of multiple, appropriately configured VPN devices that are placed in the appropriate locations within the network. </li></ul><ul><li>VPN Gateway Interface </li></ul><ul><li>The VPN client is software used for remote access for a single computer or user. </li></ul><ul><li>VPN Network and Service Management. </li></ul>
  13. 13. VPN Vendors <ul><li>Layer 2 Tunneling Protocol (L2TP): utilizing Cisco Systems” Layer-2 Forwarding and Microsoft’s Point-o-Point Tunneling Protocol (PPTP) </li></ul><ul><ul><li>Supports IP, IPX, AppleTalk, frame relay, ATM, S.25 and Sonet </li></ul></ul><ul><li>IBM Nways Multiprotocol Routing Services (MRS), Nways Multiprotocol Access Services(MAS) and Access Integration Services(AIS) </li></ul><ul><ul><li>Supports IP, APPN,TN3270 </li></ul></ul><ul><li>And there are many more ……… </li></ul>
  14. 14. Types of VPNs <ul><li>Site to Site VPNs </li></ul><ul><ul><li>Using ISDN, Frame Relay or ATM </li></ul></ul><ul><ul><li>Designed to replace a WAN </li></ul></ul><ul><li>Remote Access VPNs </li></ul><ul><ul><li>Using the Internet </li></ul></ul><ul><ul><li>Provide remote access to mobile or branch employees </li></ul></ul>
  15. 15. Site-to-Site VPN VPNs Based on ISDN, Frame Relay or ATM
  16. 16. Site-to-Site VPN vs WAN
  17. 17. Remote Access VPN VPNs Based on IP Tunnels/ Internet VPNs
  18. 18. What are the costs? <ul><li>Using the Cisco website calculator a comparison of three scenarios was made. </li></ul><ul><li>Not for small enterprises!! </li></ul>* www.cisco.com/warp/public/779/largeent/learn/technologies/vpn/site2site.html
  19. 19. VPN Directions <ul><li>Integration of VPN and firewall functions into a single device. </li></ul><ul><li>Incorporating routing and quality of service features into the VPN device will make it even more versatile and more attractive to businesses. </li></ul><ul><li>Adding intelligence to the network – Currently t he routers and switches merely forward the packets without knowing what is inside them or how to process them accordingly. ?? </li></ul>
  20. 20. Questions?????
  21. 21. Questions <ul><li>What is L2TP? PPTP? IPSec? </li></ul><ul><li>What types of VPNs are there? </li></ul><ul><li>Name two advantages of VPNs? </li></ul><ul><li>Name two disadvantages of VPNs? </li></ul><ul><li>At which layer of the OSI model do VPNs interact? </li></ul>
  22. 22. And Answers <ul><li>What is </li></ul><ul><ul><li>L2TP? Layer2 Tunneling Protocol from Cisco and Microsoft. </li></ul></ul><ul><ul><li>PPTP? MS Point-to-Point Tunneling Protocol </li></ul></ul><ul><ul><li>IPSec? IP Security, a set of standards for the Internet security; also implementations of VPN using the set of standards for Internet security </li></ul></ul><ul><li>What types of VPNs are there? </li></ul><ul><ul><li>Two were described, remote access VPNs and Site-to-Site VPNs </li></ul></ul>
  23. 23. More Answers <ul><li>Name two advantages of VPNs? </li></ul><ul><ul><li>Cost savings and good way to handle remote access are two </li></ul></ul><ul><li>Name two disadvantages of VPNs? </li></ul><ul><ul><li>Security risk and lack of QofS </li></ul></ul><ul><li>At which layer of the OSI model do VPNs interact? </li></ul><ul><ul><li>Layer 2 or Layer 3 </li></ul></ul>

×