1 / 8

Virtual Private Network(VPN)

Virtual Private Network(VPN) . Presented By Aparna Chilukuri. What is a VPN? . A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. What Makes a VPN?. Remote Access Site-to-Site Intranet Extranet Secure VPN

kylar
Download Presentation

Virtual Private Network(VPN)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtual Private Network(VPN) Presented By Aparna Chilukuri

  2. What is a VPN? • A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.

  3. WhatMakes a VPN? • Remote Access • Site-to-Site • Intranet • Extranet • Secure VPN • Trusted VPN • Hybrid VPN • Provider-Provisioned VPN

  4. VPN Security • authentication—ensuring that the data originates at the source that it claims • access control—restricting unauthorized users from gaining admission to the network • confidentiality—preventing anyone from reading or copying data as it travels across the Internet • data integrity—ensuring that no one tampers with data as it travels across the Internet

  5. What is Tunneling ? • Tunneling is the process of placing an entire packet within another packet and sending it over a network. • Tunneling requires three different protocols: • Carrier protocol • Encapsulating protocol - GRE, IPSec, L2F, PPTP, L2TP • Passenger protocol - IPX, NetBeui, IP

  6. VPN Protocols • Remote Access • PPTP(Point -to -Point Tunneling Protocol) • L2F(Layer 2 forwarding) • L2TP( Layer 2 tunneling Protocol) • Lan-to-Lan • IPSec

  7. IPSec Uses • Diffie-Hellman key exchanges to deliver secret keys between peers on a public net • public-key cryptography for signing Diffie-Hellman exchanges, to guarantee the identities of the two parties and avoid man-in-the-middle attacks • data encryption standard (DES) and other bulk encryption algorithms for encrypting data • keyed hash algorithms (HMAC, MD5, SHA) for authenticating packets • digital certificates for validating public keys

  8. Conclusion • Loopholes • Hackers will try to "piggyback" onto an existing VPN connection that a remote worker has established, either inserting viruses into a system or removing and viewing sensitive files

More Related