SlideShare a Scribd company logo
VIRTUAL PRIVATE
NETWORKS
Introduction
• Private leased lines
• Give the user dedicated use of a predefined bandwidth or data rate
• Often used to connect remote users or branch offices to a central administrative site
• Don’t scale well
• VPNs
• Function like private leased lines
• Provide a means of secure point-to-point communications over the public Internet
VPN Components and Operations
• Many telecommunications companies provideVPN services
• Can be set up with special hardware or with firewall software that includesVPN
functionality
• Many firewalls haveVPN systems built into them
• Goal of aVPN
• Provide a cost-effective and secure way to connect business locations to one another
and connect remote workers to office networks
VPN Components
• Endpoints
• Hardware and/or software components that
perform encryption and encapsulation,
• VPN connection
• Occurs within the context of aTCP/IP tunnel
• Tunnel
• Channel or pathway over a packet network used by
theVPN
• Runs through the Internet from one endpoint to
another
• Not a physical connection
• Virtual tunnel
• Communications path that makes use of
Internet-based hosts and servers to conduct data from one network station to another
Essential Activities ofVPNs
• IP encapsulation
• Hides the source and destination information of the encapsulated packets
• Encapsulating packet
• Uses the source and destination addresses of the VPN gateway
• Encapsulated packet
• Source and destination IP addresses can be in the private reserved blocks
• Not usually routable over the Internet
• Data payload encryption
• Encryption accomplished using:
• Transport mode
• Tunnel mode
• Level of encryption varies
• Higher the number of data bits used to generate keys, the stronger the encryption
• Encrypted authentication
• Encryption domain
• Everything in the protected network and behind the gateway
• Authentication
• Hosts in the network need to know that originating host is an approved user of the VPN
• Exchange of long blocks of code, called keys
• Generated by complex formulas called algorithms
Benefits and Drawbacks ofVPNs
Benefits
• Secure networking without the
expense of establishing and
maintaining leased lines
• Allow the packet
encryption/translation overhead to be
done on dedicated systems
• Provide control of
physical setup
Drawbacks
• Complex
• If configured improperly, can create
significant network vulnerabilities
• Make use of the unpredictable and
often unreliable Internet
• Can expose inner workings of network
• If misconfigured
Types ofVPNs
• Site-to-siteVPN
• Links two or more networks
• Client-to-site
• Makes a network accessible to remote users
VPN Setups
• Mesh configuration - Each participant has an approved relationship with every
other participant
• Called a security association (SA)
• Need to specifically identify each of these participants to every other participant that uses the
VPN
VPN Setups
• Hub-and-spoke arrangement - SingleVPN router contains records of all SAs in
theVPN
• Any LANs or computers need to connect to the central server
• Makes it easy to increase the size of theVPN
• As more branch offices or computers are added
Tunneling Protocols Used withVPNs
• IPSec
• Standard for secure encrypted communications
• Two security methods:
• Authenticated Headers (AH) and Encapsulating Security Payload (ESP)
• Different modes:
• Transport mode and tunnel mode
• Concerns about using tunnel mode in a client-to-siteVPN
• IKE
• Means of using public key cryptography to encrypt data between LANs or between a client
and a LAN
• Provides for the exchange of public and private keys
• IfVPN uses more than one kind of firewall
• Check with the manufacturers of those firewalls to see if their products will work with the
other firewalls you have
VPN Policies
• Policy should state:
• Who should haveVPN access to network
• Whether authentication is to be used and how it is to be used
• Whether split tunneling is permitted
• How long users can be connected using theVPN at any one session
• Whether virus protection is included
• Ensuring that all users know what constitutes proper use of theVPN
Auditing andTesting theVPN
• TestVPN client on each computer that might use theVPN
• Choose client software that is easy for end users to install on their own
• Save time and effort
• Check theVPN
• Make sure files are being transferred at an acceptable rate
• All parts of theVPN remain online when needed
Summary
• VPN devices
• Special hardware or with firewall software that includesVPN
• Essential activities:
• IP encapsulation, data payload encryption, and encrypted authentication
• General types ofVPN:
• Site-to-site and client-to-site
• VPN architecture:
• Mesh or hub-and-spoke
• Protocols
• IPSec
• Internet Key Exchange (IKE)

More Related Content

What's hot

Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
stableproxies
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
Proxy server
Proxy serverProxy server
Proxy server
Proxies Rent
 
Proxy server
Proxy serverProxy server
Proxy server
Dlovan Salih
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
Anitha Selvan
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation
Mark Ginnebaugh
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
Proxies Rent
 
Netdruid Presentation
Netdruid PresentationNetdruid Presentation
Netdruid Presentation
nikhilpatil49
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
Mer Joyce
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
Syaiful Ahdan
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
Mostafa El Lathy
 
Iuwne10 S04 L04
Iuwne10 S04 L04Iuwne10 S04 L04
Iuwne10 S04 L04
Ravi Ranjan
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
Mostafa El Lathy
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
 
Migrating It Infrastructure To Open Source
Migrating It Infrastructure To Open SourceMigrating It Infrastructure To Open Source
Migrating It Infrastructure To Open Source
ashu_21
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
Benith T
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
stableproxies
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept
Mostafa El Lathy
 

What's hot (20)

Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Proxy server
Proxy serverProxy server
Proxy server
 
Proxy server
Proxy serverProxy server
Proxy server
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Netdruid Presentation
Netdruid PresentationNetdruid Presentation
Netdruid Presentation
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Iuwne10 S04 L04
Iuwne10 S04 L04Iuwne10 S04 L04
Iuwne10 S04 L04
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Migrating It Infrastructure To Open Source
Migrating It Infrastructure To Open SourceMigrating It Infrastructure To Open Source
Migrating It Infrastructure To Open Source
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept
 

Viewers also liked

Pons, lumbierres & garcía 2002 phytoma
Pons, lumbierres & garcía 2002 phytomaPons, lumbierres & garcía 2002 phytoma
Pons, lumbierres & garcía 2002 phytoma
Rete21. Huesca
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
catherineprieto3
 
Gisella Lange Quality and Language Education
Gisella Lange Quality and Language EducationGisella Lange Quality and Language Education
Gisella Lange Quality and Language Education
eaquals
 
Pons, lumbierres, eizaguirre& albajes 2003 berlin
Pons, lumbierres, eizaguirre& albajes 2003 berlinPons, lumbierres, eizaguirre& albajes 2003 berlin
Pons, lumbierres, eizaguirre& albajes 2003 berlin
Rete21. Huesca
 
A arte da cozinha 1680
A arte da cozinha 1680A arte da cozinha 1680
A arte da cozinha 1680
Souza Dias Souza
 
Productive apps
Productive appsProductive apps
Productive apps
Wail Skanderi
 
Tema 3: Rios, suelos y vegetación (1.1)
Tema 3: Rios, suelos y vegetación (1.1)Tema 3: Rios, suelos y vegetación (1.1)
Tema 3: Rios, suelos y vegetación (1.1)
JGL79
 
Pons, roca, lumbierres & lucas 2015 sjar
Pons, roca, lumbierres & lucas 2015 sjarPons, roca, lumbierres & lucas 2015 sjar
Pons, roca, lumbierres & lucas 2015 sjar
Rete21. Huesca
 
Administración de inventarios
Administración de inventariosAdministración de inventarios
Administración de inventarios
Virtualización Distancia Empresas
 
Comitas poltorak ekbpromo_kazan
Comitas poltorak ekbpromo_kazanComitas poltorak ekbpromo_kazan
Comitas poltorak ekbpromo_kazan
ekbpromo
 
Lumbierres, roca & pons 2014 phytoma
Lumbierres, roca & pons 2014 phytomaLumbierres, roca & pons 2014 phytoma
Lumbierres, roca & pons 2014 phytoma
Rete21. Huesca
 
Pons, lumbierres & starý 2004 bsvp
Pons, lumbierres & starý 2004 bsvpPons, lumbierres & starý 2004 bsvp
Pons, lumbierres & starý 2004 bsvp
Rete21. Huesca
 
учнівська презентація
учнівська презентаціяучнівська презентація
учнівська презентація
Nataliya281968
 
Healthcare IT services market update_oct_2016
Healthcare IT services market update_oct_2016Healthcare IT services market update_oct_2016
Healthcare IT services market update_oct_2016
Damo Consulting Inc.
 
First logistik pshenisnov ekbpromo_kazan
First logistik pshenisnov ekbpromo_kazanFirst logistik pshenisnov ekbpromo_kazan
First logistik pshenisnov ekbpromo_kazan
ekbpromo
 
Ejercicios 2007 evaluacion de proyectos 1 cip - 2007
Ejercicios 2007  evaluacion de proyectos 1   cip - 2007Ejercicios 2007  evaluacion de proyectos 1   cip - 2007
Ejercicios 2007 evaluacion de proyectos 1 cip - 2007
Jovenzhito Rudy
 
Fairouz CV-16----
Fairouz CV-16----Fairouz CV-16----
Fairouz CV-16----
Fay
 
Waralaba minuman coklat di mojokerto
Waralaba minuman coklat di mojokertoWaralaba minuman coklat di mojokerto
Waralaba minuman coklat di mojokerto
waralabaminumancoklat
 
презентація Духовний символ України
презентація Духовний символ Українипрезентація Духовний символ України
презентація Духовний символ України
Nataliya281968
 
How Trek-Segafredo Powers its Racing With CA Flowdock
How Trek-Segafredo Powers its Racing With CA FlowdockHow Trek-Segafredo Powers its Racing With CA Flowdock
How Trek-Segafredo Powers its Racing With CA Flowdock
CA Technologies
 

Viewers also liked (20)

Pons, lumbierres & garcía 2002 phytoma
Pons, lumbierres & garcía 2002 phytomaPons, lumbierres & garcía 2002 phytoma
Pons, lumbierres & garcía 2002 phytoma
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Gisella Lange Quality and Language Education
Gisella Lange Quality and Language EducationGisella Lange Quality and Language Education
Gisella Lange Quality and Language Education
 
Pons, lumbierres, eizaguirre& albajes 2003 berlin
Pons, lumbierres, eizaguirre& albajes 2003 berlinPons, lumbierres, eizaguirre& albajes 2003 berlin
Pons, lumbierres, eizaguirre& albajes 2003 berlin
 
A arte da cozinha 1680
A arte da cozinha 1680A arte da cozinha 1680
A arte da cozinha 1680
 
Productive apps
Productive appsProductive apps
Productive apps
 
Tema 3: Rios, suelos y vegetación (1.1)
Tema 3: Rios, suelos y vegetación (1.1)Tema 3: Rios, suelos y vegetación (1.1)
Tema 3: Rios, suelos y vegetación (1.1)
 
Pons, roca, lumbierres & lucas 2015 sjar
Pons, roca, lumbierres & lucas 2015 sjarPons, roca, lumbierres & lucas 2015 sjar
Pons, roca, lumbierres & lucas 2015 sjar
 
Administración de inventarios
Administración de inventariosAdministración de inventarios
Administración de inventarios
 
Comitas poltorak ekbpromo_kazan
Comitas poltorak ekbpromo_kazanComitas poltorak ekbpromo_kazan
Comitas poltorak ekbpromo_kazan
 
Lumbierres, roca & pons 2014 phytoma
Lumbierres, roca & pons 2014 phytomaLumbierres, roca & pons 2014 phytoma
Lumbierres, roca & pons 2014 phytoma
 
Pons, lumbierres & starý 2004 bsvp
Pons, lumbierres & starý 2004 bsvpPons, lumbierres & starý 2004 bsvp
Pons, lumbierres & starý 2004 bsvp
 
учнівська презентація
учнівська презентаціяучнівська презентація
учнівська презентація
 
Healthcare IT services market update_oct_2016
Healthcare IT services market update_oct_2016Healthcare IT services market update_oct_2016
Healthcare IT services market update_oct_2016
 
First logistik pshenisnov ekbpromo_kazan
First logistik pshenisnov ekbpromo_kazanFirst logistik pshenisnov ekbpromo_kazan
First logistik pshenisnov ekbpromo_kazan
 
Ejercicios 2007 evaluacion de proyectos 1 cip - 2007
Ejercicios 2007  evaluacion de proyectos 1   cip - 2007Ejercicios 2007  evaluacion de proyectos 1   cip - 2007
Ejercicios 2007 evaluacion de proyectos 1 cip - 2007
 
Fairouz CV-16----
Fairouz CV-16----Fairouz CV-16----
Fairouz CV-16----
 
Waralaba minuman coklat di mojokerto
Waralaba minuman coklat di mojokertoWaralaba minuman coklat di mojokerto
Waralaba minuman coklat di mojokerto
 
презентація Духовний символ України
презентація Духовний символ Українипрезентація Духовний символ України
презентація Духовний символ України
 
How Trek-Segafredo Powers its Racing With CA Flowdock
How Trek-Segafredo Powers its Racing With CA FlowdockHow Trek-Segafredo Powers its Racing With CA Flowdock
How Trek-Segafredo Powers its Racing With CA Flowdock
 

Similar to Virtual Private Networks

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Vp ns
Vp nsVp ns
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
Advance firewalls
Advance firewallsAdvance firewalls
Advance firewalls
Subi Mastermind
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
David Barker
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
205203ANNAMALAIK
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
AkhilReddy197918
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
Rohan389045
 
Firewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepointFirewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepoint
anxiousanoja
 
Firewalls (1).ppt
Firewalls (1).pptFirewalls (1).ppt
Firewalls (1).ppt
adnanetnzr
 
Fw.ppt
Fw.pptFw.ppt
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
Sharika Technologiies
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).ppt
AnuReddy68
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
Kaushal72
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 
Firewall
FirewallFirewall
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
Moin Islam
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
HASHIR RAZA
 
Unit08
Unit08Unit08
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 

Similar to Virtual Private Networks (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp ns
Vp nsVp ns
Vp ns
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Advance firewalls
Advance firewallsAdvance firewalls
Advance firewalls
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepointFirewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepoint
 
Firewalls (1).ppt
Firewalls (1).pptFirewalls (1).ppt
Firewalls (1).ppt
 
Fw.ppt
Fw.pptFw.ppt
Fw.ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Firewall
FirewallFirewall
Firewall
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Unit08
Unit08Unit08
Unit08
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 

More from primeteacher32

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
primeteacher32
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
primeteacher32
 
Returning Data
Returning DataReturning Data
Returning Data
primeteacher32
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
primeteacher32
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
primeteacher32
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
primeteacher32
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
primeteacher32
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
primeteacher32
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
primeteacher32
 
Input Validation
Input ValidationInput Validation
Input Validation
primeteacher32
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
primeteacher32
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
primeteacher32
 
Conditionals
ConditionalsConditionals
Conditionals
primeteacher32
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
primeteacher32
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
primeteacher32
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
primeteacher32
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
primeteacher32
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
primeteacher32
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
primeteacher32
 
Block chain security
Block chain securityBlock chain security
Block chain security
primeteacher32
 

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
NWEXAM
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
SnapJob
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
ashiquepa3
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
cahgading001
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
SocMediaFin - Joyce Sullivan
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
Bruce Bennett
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
Base Camp
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
MuhammadWaqasBaloch1
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
Alliance Jobs
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 

Recently uploaded (20)

How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 

Virtual Private Networks

  • 2. Introduction • Private leased lines • Give the user dedicated use of a predefined bandwidth or data rate • Often used to connect remote users or branch offices to a central administrative site • Don’t scale well • VPNs • Function like private leased lines • Provide a means of secure point-to-point communications over the public Internet
  • 3. VPN Components and Operations • Many telecommunications companies provideVPN services • Can be set up with special hardware or with firewall software that includesVPN functionality • Many firewalls haveVPN systems built into them • Goal of aVPN • Provide a cost-effective and secure way to connect business locations to one another and connect remote workers to office networks
  • 4. VPN Components • Endpoints • Hardware and/or software components that perform encryption and encapsulation, • VPN connection • Occurs within the context of aTCP/IP tunnel • Tunnel • Channel or pathway over a packet network used by theVPN • Runs through the Internet from one endpoint to another • Not a physical connection • Virtual tunnel • Communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another
  • 5. Essential Activities ofVPNs • IP encapsulation • Hides the source and destination information of the encapsulated packets • Encapsulating packet • Uses the source and destination addresses of the VPN gateway • Encapsulated packet • Source and destination IP addresses can be in the private reserved blocks • Not usually routable over the Internet • Data payload encryption • Encryption accomplished using: • Transport mode • Tunnel mode • Level of encryption varies • Higher the number of data bits used to generate keys, the stronger the encryption • Encrypted authentication • Encryption domain • Everything in the protected network and behind the gateway • Authentication • Hosts in the network need to know that originating host is an approved user of the VPN • Exchange of long blocks of code, called keys • Generated by complex formulas called algorithms
  • 6. Benefits and Drawbacks ofVPNs Benefits • Secure networking without the expense of establishing and maintaining leased lines • Allow the packet encryption/translation overhead to be done on dedicated systems • Provide control of physical setup Drawbacks • Complex • If configured improperly, can create significant network vulnerabilities • Make use of the unpredictable and often unreliable Internet • Can expose inner workings of network • If misconfigured
  • 7. Types ofVPNs • Site-to-siteVPN • Links two or more networks • Client-to-site • Makes a network accessible to remote users
  • 8. VPN Setups • Mesh configuration - Each participant has an approved relationship with every other participant • Called a security association (SA) • Need to specifically identify each of these participants to every other participant that uses the VPN
  • 9. VPN Setups • Hub-and-spoke arrangement - SingleVPN router contains records of all SAs in theVPN • Any LANs or computers need to connect to the central server • Makes it easy to increase the size of theVPN • As more branch offices or computers are added
  • 10. Tunneling Protocols Used withVPNs • IPSec • Standard for secure encrypted communications • Two security methods: • Authenticated Headers (AH) and Encapsulating Security Payload (ESP) • Different modes: • Transport mode and tunnel mode • Concerns about using tunnel mode in a client-to-siteVPN • IKE • Means of using public key cryptography to encrypt data between LANs or between a client and a LAN • Provides for the exchange of public and private keys • IfVPN uses more than one kind of firewall • Check with the manufacturers of those firewalls to see if their products will work with the other firewalls you have
  • 11. VPN Policies • Policy should state: • Who should haveVPN access to network • Whether authentication is to be used and how it is to be used • Whether split tunneling is permitted • How long users can be connected using theVPN at any one session • Whether virus protection is included • Ensuring that all users know what constitutes proper use of theVPN
  • 12. Auditing andTesting theVPN • TestVPN client on each computer that might use theVPN • Choose client software that is easy for end users to install on their own • Save time and effort • Check theVPN • Make sure files are being transferred at an acceptable rate • All parts of theVPN remain online when needed
  • 13. Summary • VPN devices • Special hardware or with firewall software that includesVPN • Essential activities: • IP encapsulation, data payload encryption, and encrypted authentication • General types ofVPN: • Site-to-site and client-to-site • VPN architecture: • Mesh or hub-and-spoke • Protocols • IPSec • Internet Key Exchange (IKE)