1 / 32

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs). By Ryan Joyce. What is a Virtual Network ? An interconnected group of networks (an internet) that appears as one large network to a specific user What is a Virtual Private Network? A Virtual Private Network is a Virtual

bertha
Download Presentation

Virtual Private Networks (VPNs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtual Private Networks(VPNs) By Ryan Joyce

  2. What is a Virtual Network ? An interconnected group of networks (an internet) that appears as one large network to a specific user What is a Virtual Private Network? A Virtual Private Network is a Virtual Network that is secure and has attributes of LAN but over much larger scale.

  3. History of VPNs • Started with • Wide Area Networks (WANS) • Expansive leased lines • reliable • secure • Very expensive • Intranets (LANs) • Limited • reliable • Secure • Relatively inexpensive

  4. Cost of Dedicated Private Lines

  5. History (continued) • Virtual Private Networks are relatively new • Technology was created in the mid 90s • Was not made mains stream until couple years ago

  6. Why have VPNs? • Extend communications on a global scale • Create better communication with business partners • Decrease the cost of having to use traditional methods • Faster more effective reliable business

  7. Video • VPN Video

  8. VPN Setups • Variety of Options • Hardware based • VPN firewalls • edge routers • Software base • VPN clients • Mixed

  9. VPN Hardware

  10. VPN Software

  11. VPN Setups • Remote Users • Refers to communication access of a company’s network to remote or mobile employees (home users) • Requires monitoring and strong authentication practices • Scalability remains and important issue must be able to handle larger number of users.

  12. Remote Setup mobile user Encryption Router INTERNET Home user LAN A

  13. VPN Setups • Intranet Setup • Refers to linking a companies internal branches or subsidiaries together • Requires high security, must be able to transmit and receive sensitive information • Requires high reliability, applications that effect day to day operations • Scalable to a point.

  14. Intranet based Encryption Router LANB INTERNET LAN A Encryption Router

  15. VPN Setups • Extranet Setups • Refers to VPN between companies customers and suppliers • Requires standardization the IPSec current standard for VPNs • Need for traffic control, networks must be monitored for accurate delivery of critical data

  16. Extranet Based Encryption Router LAN A INTERNET Suppliers LAN Encryption Router

  17. How VPNS work? • Tunneling • Creating a secure point to point connection over a public network. • Each box represents encapsulation Datagram Header Encrypted Transport Datagram Original Datagram

  18. Security Requirements and Approaches • Confidentiality • refers to the privacy of information being exchanged between communicating parties. • Encryption • secret key cryptography • Public key cryptography

  19. Encryption • Public Key • Private Key • MD5 • Message digest “hashing” algorrithm • SET protocol • Secure electronic transactions • SSl protocol • Secure socket layer protocol

  20. Security Requirements and Approaches • Data Integrity • Integrity ensures that information being transmitted over the public Internet is not altered in any way during transit. • Insuring Data • One way hash functions • Message-authentication codes • Digital signatures

  21. Security Requirements and Approaches • Authentication • Ensuring the identities of all communicating parties. • Authentication practices • Password authentication • Digital certificates • Token cards created from a time stamp

  22. VPN Protocols • IPSec (Internet Protocol Security) • Developed by IETF • designed to address IP based networks • encapsulates a packet with another packet and encrypts the packet • PPTP (Point to Point Tunneling Protocol) • Used for remote users • Encapsulates packets

  23. VPN Protocols(continued) • L2TP (Layer 2 tunneling protocol) • Evolved from PPTP • Client aware tunneling • Client transparent tunneling • Socks5 • Circuit level protocol • Originally designed to authenticate protocols • mainly use for extranet configurations • great for user level application control

  24. Selecting A VPN • Things to consider • Integration • Will it be compatible with existing intranets • Software versus Hardware • Software cheap more difficult to implement less reliable slower • Hardware more expensive easy to set up more reliable faster

  25. Applications of VPNs • Manufacturing • Factory operations linking corporate headquarters to all of its facilities • Retail • Local stores connected directly to regional offices delivering relevant sales data • Medical • Transferring patient data across hospital networks • Finance • Online banking transactions, remote user access

  26. Applications VPNs • Home users • Windows VPN connection • VPN Connection Video

  27. Problems with VPNs • Setup Times • Difficult Trouble Shooting • Interoperability with other networks • Reliability with ISPs • Bandwidth Constraints

  28. Optimizing VPNs Single VPN Two path ways

  29. Optimizing VPNs • Multi VPNs Multi pathways

  30. The Future of VPNs • Protocol Standardization • New hardware • Better Software • Used more frequently • Will become the new business standard

  31. References • Dunigan, Tom. Virtual Private Networks Retrieved October 15, 2007 Posted October 13, 2004 http://www.csm.ornl.gov/~dunigan/vpn.html • McDonald, Christopher. Virtual Private Networks An overview RetrievedOctober 16, 2007 from Intranet Journal.com http://www.intranetjournal.com/foundation/vpn-1.shtml • Virtual Private Networks. Retrieved October 16, 2007 from Cisco Posted October 12 , 2006. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/vpn.htm • Virtual Private Networking Retrieved October 15, 2007 http://www.microsoft.com/technet/isa/2004/help/fw_VPNIntro.mspx?mfr=true

More Related