Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

(Virtual Private Network (VPN


Published on

  • Be the first to comment

(Virtual Private Network (VPN

  1. 1. Virtual Private Network (VPN)
  2. 2. <ul><li>“ If saving money is wrong, I don’t want to be right…” </li></ul><ul><li>- William Shartner </li></ul>
  3. 3. outline <ul><li>What is a VPN? </li></ul><ul><ul><li>Types of VPN </li></ul></ul><ul><ul><li>Why use VPNs? </li></ul></ul><ul><ul><li>Disadvantage of VPN </li></ul></ul><ul><ul><li>Types of VPN protocols </li></ul></ul><ul><ul><li>Encryption </li></ul></ul>
  4. 4. What is a VPN? <ul><li>A VPN is A network that uses Internet or other network service to transmit data. </li></ul><ul><li>A VPN includes authentication and encryption to protect data integrity and confidentiality </li></ul>Internet VPN VPN
  5. 5. Types of VPNs <ul><li>Remote Access VPN </li></ul><ul><ul><li>Provides access to internal corporate network over the Internet. </li></ul></ul><ul><ul><li>Reduces long distance, modem bank, and technical support costs. </li></ul></ul>Internet Corporate Site
  6. 6. Types of VPNs <ul><li>Remote Access VPN </li></ul><ul><li>Site-to-Site VPN </li></ul><ul><ul><li>Connects multiple offices over Internet </li></ul></ul><ul><ul><li>Reduces dependencies on frame relay and leased lines </li></ul></ul>Internet Branch Office Corporate Site
  7. 7. Types of VPNs <ul><li>Remote Access VPN </li></ul><ul><li>Site-to-Site VPN </li></ul><ul><ul><li>Extranet VPN </li></ul></ul><ul><ul><ul><li>Provides business partners access to critical information (leads, sales tools, etc) </li></ul></ul></ul><ul><ul><ul><li>Reduces transaction and operational costs </li></ul></ul></ul>Corporate Site Internet Partner #1 Partner #2
  8. 8. Types of VPNs <ul><li>Remote Access VPN </li></ul><ul><li>Site-to-Site VPN </li></ul><ul><ul><li>Extranet VPN </li></ul></ul><ul><ul><li>Intranet VPN: </li></ul></ul><ul><li>Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. </li></ul>Internet LAN clients Database Server LAN clients with sensitive data
  9. 9. Why Use Virtual Private Networks? <ul><li>More flexibility </li></ul><ul><ul><li>Use multiple connection types (cable, DSL, T1, T3) </li></ul></ul><ul><ul><li>Secure and low-cost way to link </li></ul></ul><ul><ul><li>Ubiquitous ISP services </li></ul></ul><ul><ul><li>Easier E-commerce </li></ul></ul>
  10. 10. Why Use Virtual Private Networks? <ul><li>More flexibility </li></ul><ul><li>More scalability </li></ul><ul><ul><li>Add new sites, users quickly </li></ul></ul><ul><ul><li>Scale bandwidth to meet demand </li></ul></ul>
  11. 11. Why Use Virtual Private Networks? <ul><li>More flexibility </li></ul><ul><li>More scalability </li></ul><ul><li>Lower costs </li></ul><ul><ul><li>Reduced frame relay/leased line costs </li></ul></ul><ul><ul><li>Reduced long distance </li></ul></ul><ul><ul><li>Reduced equipment costs (modem banks,CSU/DSUs) </li></ul></ul><ul><ul><li>Reduced technical training and support </li></ul></ul>
  12. 12. VPN Return on Investment <ul><li>5 branch offices, 1 large corporate office, 200 remote access users. </li></ul><ul><li>Payback: 1.04 months. Annual Savings: 88% </li></ul>Case History – Professional Services Company Check Point VPN Solution Non-VPN Solution Savings with Check Point Startup Costs (Hardware and Software) $51,965 Existing; sunk costs = $0 Site-to-Site Annual Cost $30,485 $71,664 Frame relay $41,180 /yr RAS Annual Cost $48,000 $604,800 Dial-in costs $556,800 /yr Combined Annual Cost $78,485 $676,464 $597,980 /yr
  13. 13. Disadvantages of VPN <ul><li>Lower bandwidth available compared to dial-in line </li></ul><ul><li>Inconsistent remote access performance due to changes in Internet connectivity </li></ul><ul><li>No entrance into the network if the Internet connection is broken </li></ul>
  14. 14. Point-to-Point Tunneling Protocol (PPTP) <ul><li>Layer 2 remote access VPN distributed with Windows product family </li></ul><ul><ul><li>Addition to Point-to-Point Protocol (PPP) </li></ul></ul><ul><ul><li>Allows multiple Layer 3 Protocols </li></ul></ul><ul><li>Uses proprietary authentication and encryption </li></ul><ul><li>Limited user management and scalability </li></ul><ul><ul><li>Used MPPE encryption method </li></ul></ul>Remote PPTP Client ISP Remote Access Switch PPTP RAS Server Corporate Network Internet
  15. 15. Layer 2 Tunneling Protocol (L2TP) <ul><li>Layer 2 remote access VPN protocol </li></ul><ul><ul><li>Combines and extends PPTP and L2F (Cisco supported protocol) </li></ul></ul><ul><ul><li>Weak authentication and encryption </li></ul></ul><ul><ul><li>Addition to Point-to-Point Protocol (PPP) </li></ul></ul><ul><ul><li>Must be combined with IPSec for enterprise-level security </li></ul></ul>Remote L2TP Client ISP L2TP Concentrator L2TP Server Corporate Network Internet
  16. 16. Internet Protocol Security (IPSec) <ul><li>Layer 3 protocol for remote access, intranet, and extranet VPNs </li></ul><ul><ul><li>Internet standard for VPNs </li></ul></ul><ul><ul><li>Provides flexible encryption and message authentication/integrity </li></ul></ul>
  17. 17. Encryption <ul><li>Used to convert data to a secret code for transmission over an trusted network </li></ul>Encryption Algorithm “ The cow jumped over the moon” “ 4hsd4e3mjvd3sd a1d38esdf2w4d” Clear Text Encrypted Text
  18. 18. Symmetric Encryption <ul><li>Same key used to encrypt and decrypt message </li></ul><ul><li>Faster than asymmetric encryption </li></ul><ul><li>Used by IPSec to encrypt actual message data </li></ul><ul><li>Examples: DES, 3DES, RC5 </li></ul>Shared Secret Key
  19. 19. Asymmetric Encryption <ul><li>Different keys used to encrypt and decrypt message (One public, one private) </li></ul><ul><li>Provides non-repudiation of message or message integrity </li></ul><ul><li>Examples include RSA, DSA, SHA-1, MD-5 </li></ul>Alice Public Key Encrypt Alice Private Key Decrypt Bob Alice
  20. 20. Industries That May Use a VPN <ul><li>Healthcare : enables the transferring of confidential patient information within the medical facilities & health care provider </li></ul><ul><li>Manufacturing : allow suppliers to view inventory & allow clients to purchase online safely </li></ul><ul><li>Retail : able to securely transfer sales data or customer info between stores & the headquarters </li></ul><ul><li>Banking/Financial : enables account information to be transferred safely within departments & branches </li></ul><ul><li>General Business : communication between remote employees can be securely exchanged </li></ul>
  21. 21. Some Businesses using a VPN <ul><li>CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN </li></ul><ul><li>Bacardi & Co. Implemented a 21-country, 44-location VPN </li></ul>
  22. 22. Questions
  23. 23. <ul><li>presented by : </li></ul><ul><li>Iman Abooee </li></ul><ul><li>Thanks for your attention </li></ul><ul><li>Winter 85 </li></ul>
  24. 24. Resource: <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>www. </li></ul>