Download
virtual private network n.
Skip this Video
Loading SlideShow in 5 Seconds..
Virtual Private Network PowerPoint Presentation
Download Presentation
Virtual Private Network

Virtual Private Network

135 Views Download Presentation
Download Presentation

Virtual Private Network

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Virtual Private Network “The Virtual Netters” Loraine Cano Mahesh Sridharan Rajnikanth Jaipaul

  2. What is a Virtual Private Network? • “The service of the Millenium” • VPN typically uses the internet as the transport backbone to establish secure links. • The client is “virtually” on the corporate network and can be physically countries away.

  3. VPN

  4. Exponential Growth

  5. Who is the Competitive Edge for? • Service Provider • Subscriber • Efficiency • Profitability • Continuous growth

  6. What does a VPN offer? • Low Cost and High Flexibility • The remote user can get network access by making a local call, reducing both line charges and equipment costs substantially.

  7. In –House RAS Outsourced VPN Total Users 100 100 Local Usage (hrs/Month) 300 300 long-distance (hrs/Month) 2100 2100 800#/ International Usage 0 0 Monthly Telco Charges 12600 0 User Internet Access ($20/month) 0 2000 Backbone Internet Access (TI) 1000 1000 Monthly Connectivity Fees 1000 3000 RAS Equipment Maintenance 200 0 In-House4 User Support Staff 1250 0 RAS Equipment Depreciation 278 0 VPN Remote Access (+$40/User) 0 4000 Monthly Infrastructure Cost 1728 4000 Total Monthly Cost 15328 7,000 Savings per Month - 8,328 (54%) Month to Recover Investment. - <2

  8. What Are the Issues involved with VPN? • Piecemeal approach and lack of standards • Decreases security • Traffic control • Enterprise Management

  9. What are the 3 types of VPNs? • Remote Access • Extranet • Intranet

  10. What is Remote Access VPN? Remote Access

  11. What is Extranet VPN?

  12. What is Intranet VPN?

  13. Tunneling

  14. Tunnelling Protocols • Layer 2 Protocol • Layer 3 Protocol • IP Sec

  15. User Authentication • Password Authentication Protocol. • Challenge-Handshake Authentication Protocol (CHAP)

  16. Types of Tunnels • Voluntary Tunnel • Compulsory Tunnel

  17. What are the features of VPN ? • Security • Traffic Control • Enterprise Management

  18. How is security ensured ? • Access Control • Authentication • Encryption • Symmetric Encryption • Asymmetric Encryption • Firewall • before VPN Server • after VPN Server

  19. How to choose VPN solution ? • ISP Use • VPN Application • Tunneling Protocols

  20. Remote Access Example • Rajni (Lubbock) connects to Mahesh Inc. (Dallas) • Rajni dials into local ISP • When connectivity to Mahesh Inc is established, client initiates tunnel request to destination server • The VPN server authenticates and creates end of tunnel • Rajni sends encrypted data over ISP • VPN server decrypts data • Any information sent back to Rajni is also encrypted