SlideShare a Scribd company logo
Virtual Private Networks(VPNs)
Sohel Rana
(1104046)
Objectives
 Virtual Private Networks (VPNs)
 Why?
 How?
Motivation
 institutions often want private networks for security.
 VPN: institution’s inter-office traffic is sent over public Internet instead
Virtual Private Networks(VPNs)
 encrypted before entering public
Internet
 logically separate from other traffic
Four Critical Functions
 data integrity
 origin authentication
 replay attack prevention
 confidentiality
IPsec Datagram Packet Form
 Tunnel Mode
 Transport Mode
The tunnel mode, being more
appropriate for VPNs
IPsec Protocol
 Authentication Header (AH) protocol
 provides source authentication &
data integrity but not confidentiality
 Encapsulation Security Protocol (ESP)
 provides source authentication, data
integrity, and confidentiality
 more widely used than AH
Security Associations (SAs)
 before sending data, “security association (SA)” established from
sending to receiving entity
 ending, receiving entitles maintain state information about SA
Example SA from R1 to R2
R1 stores for SA:
 32-bit SA identifier: Security Parameter Index (SPI)
 origin SA interface (200.168.1.100)
 destination SA interface (193.68.2.23)
 type of encryption used (e.g., 3DES with CBC)
 encryption key
 type of integrity check used (e.g., HMAC with MD5)
 authentication key
193.68.2.23200.168.1.100
172.16.1/24
172.16.2/24
security association
Internetheadquarters branch office
R1 R2
IPsec datagram
193.68.2.23200.168.1.100
172.16.1/24
172.16.2/24
security association
Internetheadquarters
branch office
R1
R2
new IP
header
ESP
hdr
original
IP hdr
Original IP
datagram payload
ESP
trl
ESP
auth
encrypted
“enchilada” authenticated
padding
pad
length
next
header
SPI
Seq
#
Conclusion
• Learn about and reason behind using Virtual Private Networks
• Learn How it works
• Learn what services does IPsec provide
Thank You
Any Question?

More Related Content

What's hot

Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
Kirti Ahirrao
 
Control cloud data access privilege and anonymity with fully anonymous attri...
Control cloud data access privilege and anonymity with  fully anonymous attri...Control cloud data access privilege and anonymity with  fully anonymous attri...
Control cloud data access privilege and anonymity with fully anonymous attri...
LeMeniz Infotech
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Websphere - Introduction to ssl part ii
Websphere - Introduction to  ssl part iiWebsphere - Introduction to  ssl part ii
Websphere - Introduction to ssl part ii
Vibrant Technologies & Computers
 
Mule anypointenterprisesecurity
Mule anypointenterprisesecurityMule anypointenterprisesecurity
Mule anypointenterprisesecurity
himajareddys
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Mphasis
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
Hasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionHasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solution
IMPULSE_TECHNOLOGY
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
RitaThakkar1
 
Network Security Practices-Authentication application
Network Security Practices-Authentication applicationNetwork Security Practices-Authentication application
Network Security Practices-Authentication application
Gayathridevi120
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
Mohibullah Saail
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
SAHEEL FAL DESAI
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
Fathima Rahaman
 
AAA Protocol
AAA ProtocolAAA Protocol
AAA Protocol
Netwax Lab
 

What's hot (20)

Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
Control cloud data access privilege and anonymity with fully anonymous attri...
Control cloud data access privilege and anonymity with  fully anonymous attri...Control cloud data access privilege and anonymity with  fully anonymous attri...
Control cloud data access privilege and anonymity with fully anonymous attri...
 
Web Security
Web SecurityWeb Security
Web Security
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Websphere - Introduction to ssl part ii
Websphere - Introduction to  ssl part iiWebsphere - Introduction to  ssl part ii
Websphere - Introduction to ssl part ii
 
Mule anypointenterprisesecurity
Mule anypointenterprisesecurityMule anypointenterprisesecurity
Mule anypointenterprisesecurity
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Hasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionHasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solution
 
Lecture17
Lecture17Lecture17
Lecture17
 
Unit08
Unit08Unit08
Unit08
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
 
Iuwne10 S04 L02
Iuwne10 S04 L02Iuwne10 S04 L02
Iuwne10 S04 L02
 
Network Security Practices-Authentication application
Network Security Practices-Authentication applicationNetwork Security Practices-Authentication application
Network Security Practices-Authentication application
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
AAA Protocol
AAA ProtocolAAA Protocol
AAA Protocol
 

Similar to vpn_1104046

IS - SSL
IS - SSLIS - SSL
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ip security
Ip security Ip security
Ip security
Naveen Dubey
 
Ip Sec
Ip SecIp Sec
Network security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptxNetwork security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptx
ahsanAli918806
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6phanleson
 
Ciphers
CiphersCiphers
Ip security
Ip security Ip security
Ip security
Dr.K.Sreenivas Rao
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
nandan543979
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
SubashiniRathinavel
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
Chaitanya Tata, PMP
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
anoean
 

Similar to vpn_1104046 (20)

Websecurity
Websecurity Websecurity
Websecurity
 
Web Security
Web SecurityWeb Security
Web Security
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
IP Security
IP SecurityIP Security
IP Security
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Ip security
Ip security Ip security
Ip security
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Network security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptxNetwork security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptx
 
Ch16
Ch16Ch16
Ch16
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6
 
Ciphers
CiphersCiphers
Ciphers
 
Ip security
Ip security Ip security
Ip security
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Unit 6
Unit 6Unit 6
Unit 6
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
 

vpn_1104046