Final semester Presentation , About Virtual Private Network, Microsoft Forefront Thread Management Gateway, LAN Security, A campus network can easily span many buildings, bridges were used to connect the buildings together this broke up the collision domains, but the network was still one large broadcast domain. More and more users were attached to the hubs used in the network, here the performance problems in traditional campus networks included collisions, broadcasts and multicasts, and bandwidth. and soon the performance of the network was considered extremely slow. If a link or hub become down then there was no redundant link or backup hub so Redundancy was also extreme problem in traditional campus network.
3. Table Of Contents
What is a Firewall?
VPN Introduction-What is VPN and who uses it?
Types of VPN’s
VPN topology How it works
VPN Protocols
VPN Advantages
TMG Introduction
Summary/Conclusion
4. What is a Firewall?
A firewall is a device which is standing between
two networks and allow authorized traffic that one
satisfies the rule and policies of firewall.
OR
A firewall is basically a gateway all incoming and
outgoing traffic must pass through it and as it is
stated it will allow only authorized traffic.
By authorized traffic we mean the traffic that
satisfies the policy of firewall.
5. Types of Firewall
Hardware Based Firewall: Those firewalls which can
be physically touchable. These firewalls are most
commonly used in the world of networking to make
the local network secure. For Example: ASA
(Adaptive Security Appliance) in brief it is Cisco
security device
Software Based Firewall: These firewalls are in
software from or these are applications that
configured on systems and do the job of firewall. For
Example: Windows firewall, ISA,TMG.
6. What is a VPN?
A Virtual Private Network (VPN) extends a
private network across a public network, such
as the Internet.
In simple words virtual private network is used
to access private network from public network
in a secure way.
Large corporation educational institutions and
Government Agencies use VPN Technology to
enable remote user to securely connect to a
Private Network.
7. Who uses VPN’s?
VPN’s can be found in homes, workplaces,
or anywhere else as long as an ISP (Internet
Service Provider) is available.
VPN’s allow company employees who travel
often or who are outside their company
headquarters to safely and securely connect
to their company’s Intranet
9. Remote-Access VPN
Remote-access, also called a Virtual Private
dial-up network (VPDN), is a user-to-LAN
connection used by a company that has
employees who need to connect to the private
network from various remote locations.
Remote-access is used for connecting an individual
computer to a network.
A good example of a company that needs a
remote-access VPN would be a large firm with
hundreds of sales people in the field.
10. Site-to-Site VPN
Site-to-Site VPN allows employees in
geographically disparate offices to share one
related virtual network. A VPN can also be used to
interconnect two similar networks over a dissimilar
middle networks, In this type of VPN a tunnel is
created between to TMG as VPN servers and the
both private network can access each other
through internet by creation of virtual tunnel. All
traffic is passed from this virtual tunnel.
11. VPN Protocol
Point-to-point tunneling protocol (PPTP)
PPTP is widely supported by Microsoft as it is
built into the various flavors of the Windows OS
PPTP initially had weak security features,
however, Microsoft continues to improve its
support
12. Advantages of VPN’s
The main advantage of
VPN’s, is cost savings.
VPN’s lower costs by
eliminating the need for
expensive long-distance
leased lines. A local leased
line or even a broadband
connection is all that’s
needed to connect to the
Internet and utilize the public
network to securely tunnel a
private connection.
13. TMG (Threat Management
Gateway)
Microsoft Threat Management Gateway (TMG) is
a software base firewall which can blocks all kind
of traffic on network environment. TMG is a
network security and protection for Microsoft
Operation System .TMG is a software base
firewall that can allows and denied the services to
the TMG client’s machine.
Microsoft Threat Management Gateway (TMG),
formerly known as Microsoft Internet Security and
Acceleration server (ISA Server). Microsoft TMG is
a firewall application which inspect network traffic
(including web services, web content, secure web
content and emails).
14. Requirements for TMG
System with (dual core,core 2 duo, Quad
core,core i3,etc) processor to support TMG.
System with at least 2GB Ram on which TMG is going
to be installed.
The System must have atleast 2 NIC cards.
The system must support the below operating systems.
Windows server 2008 sp2 64 Bits.
Windows server 2008 R2 64 Bits.
Web services
Routing and Remote Access Services