Virtual Private Networks updated.ppt

3,540 views

Published on

0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,540
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
406
Comments
0
Likes
6
Embeds 0
No embeds

No notes for slide

Virtual Private Networks updated.ppt

  1. 1. Virtual Private Networks (VPN’s) By: Agasi Aslanyan Joel Almasol Joe Nghe Michael Wong CIS 484 May 20, 2004
  2. 2. Table Of Contents <ul><li>VPN Introduction – What is VPN and who uses it? </li></ul><ul><li>3 Types of VPN’s </li></ul><ul><li>VPN Protocols </li></ul><ul><li>VPN Tunneling </li></ul><ul><li>VPN Packet Transmission </li></ul><ul><li>VPN Security: Firewalls </li></ul><ul><li>VPN Devices </li></ul><ul><li>VPN Advantages/Disadvantages </li></ul><ul><li>VPN Connections in Windows XP </li></ul><ul><li>Summary/Conclusion </li></ul>
  3. 3. What is a VPN? <ul><li>A virtual private network (VPN) is a network that uses public means of transmission (Internet) as its WAN link </li></ul>
  4. 4. What is a VPN? (Cont.) <ul><li>A VPN can be created by connecting offices and single users (including mobile users) to the nearest service providers POP (Point of Presence) and using that service provider’s backbone network, or even the Internet, as the tunnel between offices </li></ul><ul><li>Traffic that flows through the backbone is encrypted to prevent intruders from spying or intercepting the data </li></ul>
  5. 5. What is a VPN? (Cont.)
  6. 6. Who uses VPN’s? <ul><li>VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available. </li></ul><ul><li>VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet </li></ul>
  7. 7. 3 Types of VPN <ul><li>Remote-Access VPN </li></ul><ul><li>Site-to-Site VPN ( Intranet-based ) </li></ul><ul><li>Site-to-Site VPN ( Extranet-based ) </li></ul>
  8. 8. Remote-Access VPN <ul><li>Remote-access , also called a virtual private dial-up network ( VPDN ), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. </li></ul><ul><li>A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field. </li></ul><ul><li>Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider. </li></ul>
  9. 9. Site-to-Site VPN <ul><li>Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. </li></ul><ul><li>Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment. </li></ul>
  10. 10. All 3 types of VPN
  11. 11. VPN Protocols <ul><li>There are three main protocols that power the vast majority of VPN’s: </li></ul><ul><ul><li>PPTP </li></ul></ul><ul><ul><li>L2TP </li></ul></ul><ul><ul><li>IPsec </li></ul></ul><ul><li>All three protocols emphasize encryption and authentication; preserving data integrity that may be sensitive and allowing clients/servers to establish an identity on the network </li></ul>
  12. 12. VPN Protocols (In depth) <ul><li>Point-to-point tunneling protocol (PPTP) </li></ul><ul><ul><li>PPTP is widely supported by Microsoft as it is built into the various flavors of the Windows OS </li></ul></ul><ul><ul><li>PPTP initially had weak security features, however, Microsoft continues to improve its support </li></ul></ul><ul><li>Layer Two tunneling protocol (L2TP) </li></ul><ul><ul><li>L2TP was the original competitor to PPTP and was implemented primarily in Cisco products </li></ul></ul><ul><ul><li>L2TP is a combination of the best features of an older protocol L2F and PPTP </li></ul></ul><ul><ul><li>L2TP exists at the datalink layer (Layer 2) of the OSI model </li></ul></ul>
  13. 13. <ul><li>Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication. </li></ul><ul><li>IPSec has two encryption modes: tunnel and transport . Tunnel encrypts the header and the payload of each packet while transport only encrypts the payload. Only systems that are IPSec compliant can take advantage of this protocol. </li></ul><ul><li>IPSec can encrypt data between various devices, such as: </li></ul><ul><ul><li>Router to router </li></ul></ul><ul><ul><li>Firewall to router </li></ul></ul><ul><ul><li>PC to router </li></ul></ul><ul><ul><li>PC to server </li></ul></ul>VPN Protocols (continued)
  14. 14. VPN Tunneling <ul><li>VPN Tunneling supports two types: voluntary tunneling and compulsory tunneling </li></ul><ul><li>Voluntary tunneling is where the VPN client manages the connection setup. </li></ul><ul><li>Compulsory tunneling is where the carrier network provider manages the VPN connection setup. </li></ul>
  15. 15. Tunneling <ul><li>Most VPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. </li></ul><ul><li>Tunneling requires three different protocols: </li></ul><ul><li>Passenger protocol - The original data (IPX, IP) being carried </li></ul><ul><li>Encapsulating protocol - The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data </li></ul><ul><li>Carrier protocol - The protocol used by the network that the information is traveling over </li></ul>
  16. 16. VPN Packet Transmission <ul><li>Packets are first encrypted before sent out for transmission over the Internet. The encrypted packet is placed inside an unencrypted packet. The unencrypted outer packet is read by the routing equipment so that it may be properly routed to its destination </li></ul><ul><li>Once the packet reaches its destination, the outer packet is stripped off and the inner packet is decrypted </li></ul>
  17. 17. VPN Security: Firewalls <ul><li>A well-designed VPN uses several methods for keeping your connection and data secure: </li></ul><ul><li>Firewalls </li></ul><ul><li>Encryption </li></ul><ul><li>IPSec </li></ul><ul><li>AAA Server </li></ul><ul><li>You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through. </li></ul>
  18. 18. Some VPN products, such as Cisco 1700 routers, can be upgraded to include firewall capabilities by running the appropriate Cisco IOS on them. Cisco 1700 Series Routers
  19. 19. VPN Concentrator <ul><li>Incorporating the most advanced encryption and authentication techniques available, Cisco VPN concentrators are built specifically for creating a remote-access VPN. </li></ul><ul><li>The concentrators are offered in models suitable for everything from small businesses with up to 100 remote-access users to large organizations with up to 10,000 simultaneous remote users. </li></ul>
  20. 20. Advantages of VPN’s <ul><li>There are two main advantages of VPN’s, namely cost savings and scalability </li></ul><ul><li>VPN’s lower costs by eliminating the need for expensive long-distance leased lines. A local leased line or even a broadband connection is all that’s needed to connect to the Internet and utilize the public network to securely tunnel a private connection </li></ul>
  21. 21. Advantages of VPN’s (continued) <ul><li>As the number of company branches grows, purchasing additional leased-lines increases cost exponentially, which is why VPN’s offer even greater cost savings when scalability is an issue </li></ul><ul><li>VPN’s may also be used to span globally, which lowers cost even more when compared to traditional leased lines </li></ul>
  22. 22. Disadvantages of VPN’s <ul><li>Because the connection travels over public lines, a strong understanding of network security issues and proper precautions before VPN deployment are necessary </li></ul><ul><li>VPN connection stability is mainly in control of the Internet stability, factors outside an organizations control </li></ul><ul><li>Differing VPN technologies may not work together due to immature standards </li></ul>
  23. 23. VPN Connection in XP
  24. 31. Summary <ul><li>A virtual private network (VPN) is a network that uses public means of transmission (Internet) as its WAN link, connecting clients who are geographically separated through secure tunneling methods </li></ul><ul><li>Main VPN protocols include PPTP, L2TP, and IPsec </li></ul><ul><li>VPN Tunneling supports two types: voluntary tunneling and compulsory tunneling </li></ul><ul><li>Cost and Scalability are the main advantages of a VPN </li></ul><ul><li>Network security and Internet stability are the main concerns for VPN’s </li></ul>
  25. 32. Resources Used <ul><li>http://vpn.shmoo.com/ </li></ul><ul><li>http://www.uwsp.edu/it/vpn/ </li></ul><ul><li>http://info.lib.uh.edu/services/vpn.html </li></ul><ul><li>http://www.cites.uiuc.edu/vpn/ </li></ul><ul><li>http://www.positivenetworks.net/images/client-uploads/jumppage2.htm </li></ul>
  26. 33. The End <ul><li>Thank you all for your time. We hope you found this presentation informative. </li></ul>

×