1 / 27

VPN: Virtual Private Network

VPN: Virtual Private Network. Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras. Outline. Introductions What is it? Overview Security/Tunneling Advantages and Disadvantages Demonstration. Introductions. Gregg BSG – Student Developer

Download Presentation

VPN: Virtual Private Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras

  2. Outline • Introductions • What is it? • Overview • Security/Tunneling • Advantages and Disadvantages • Demonstration

  3. Introductions • Gregg • BSG – Student Developer • Unified Western Grocers – Retail Technology Specialist • Liz • BSG – Business Analyst • ResNet – Network Technician • COB CRC: Tier 2/3 Support Technician • Whitney • BSG – Student Tester/Analyst

  4. VPN: What is it? • Virtual Private Network • Remote network communication through Internet • Used by companies/organizations who want to communicate confidentially • Two parts: • Protected or “inside” network • “Outside” network or segment (less trustworthy)

  5. VPN: Types • Secure VPNs use cryptographic tunneling protocols. • IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3, VPN-Q and MPVPN • Trusted VPNs rely on the security of a single provider’s network to protect the traffic. • MPLS and L2F

  6. VPN: Security • Encryption • IPSec • Authentication • User/System and Data • AAA Servers (Authentication, Authorization, and Accounting) • Firewalls

  7. VPN: Tunneling • Requires 3 protocols • Carrier • Default network protocol • Passenger • Original data • Encapsulation • GRE, IPSec, L2F, PPTP, L2TP

  8. VPN: Encapsulation Figure 1

  9. VPN: Tunneling (cont.) • Two Basic types of tunneling • Site-to-Site • Typically uses GRE • Remote-Access • Typically uses PPP

  10. VPN: Advantages • Cost Effective • Greater scalability • Easy to add/remove users • Mobility • Security

  11. VPN: Disadvantages • Understanding of security issues • Unpredictable Internet traffic • Difficult to accommodate products from different vendors

  12. VPN Demonstration Click on Start – select Network Connections

  13. VPN Demonstration In Network Connections on the left hand side there is a link to “Create New Connection” – click on this and a wizard will pop up assisting the user

  14. VPN Demonstration Select “Connect to the Network at my Workplace”

  15. VPN Demonstration Select “Virtual Private Network Connection”

  16. VPN Demonstration Make a name for this connection that you are establishing – to distinguish this connection from other VPN connections that might already be established

  17. VPN Demonstration For this demonstration I am trying to connect to my wireless router off campus therefore the IP address that I insert is the IP address for my router which I can find out by running an ipconfig and it is the IP address for your default gateway NOTE: Not all routers will allow users to VPN into it

  18. VPN Demonstration Personal preference as to whether or not you want other users to be able to use this VPN connection on this computer

  19. VPN Demonstration

  20. VPN Demonstration

  21. VPN Demonstration This is a profile (username and password) that has already been created on your router – which can be created by typing in the IP address of your router in a web browser

  22. VPN Demonstration

  23. VPN Demonstration In Start – Run insert the IP address of the computer that you want to access that is connected to the router

  24. VPN Demonstration Using the same username and password already established for the router you can connect to this specific computer

  25. VPN Demonstration These are only the files that are “shared” on this computer

  26. How to Connect to OSU: • How to connect to OSU: • Dave Sullivan made a helpful Tutorial • First on the Engineering Website you have to download the Cisco VPN Client • One must acquire authorization information prior to using the VPN service • Once registration is complete you download the appropriate client depending on your operating system; and follow the steps to complete the connection

  27. References • [Figure 1] <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt> • Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>. • Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>. • "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.

More Related