1 / 21

Donnie Miles Holly Murray Kevin Osborn Wayne Roussel

Virtual Private Network (VPN). Donnie Miles Holly Murray Kevin Osborn Wayne Roussel. March 15 th , 2000. Topics of Discussion. What is VPN? Why use VPN? What are the elements of VPN? How does VPN work? How does VPN keep data secure?. ?. What is VPN?. Virtual Private Network (VPN)

nani
Download Presentation

Donnie Miles Holly Murray Kevin Osborn Wayne Roussel

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtual Private Network (VPN) Donnie Miles Holly Murray Kevin Osborn Wayne Roussel March 15th, 2000

  2. Topics of Discussion • What is VPN? • Why use VPN? • What are the elements of VPN? • How does VPN work? • How does VPN keep data secure? ?

  3. What is VPN? • Virtual Private Network (VPN) • Connects remote users who belong to a private network • Allows private communications over a public network

  4. Who is using VPN technology? • Perot Systems Corp. • Switching to a VPN saved them $1,100/month • DMR Consulting • A VPN not only saves money but it also helps develop a team spirit

  5. Why use VPN? • Remote access to the corporate network is required (individual users and business branches) • Toll calls for connection are expensive • The internet is public

  6. Why use VPN? • Connectivity – access can be gained from virtually anywhere • Cost – long distance charges and leased phone lines cost $1000’s – VPN can save 70%-80% • Remote users “feel” like part of the company

  7. What are the elements of VPN? • Server hardware/software • Client hardware/software

  8. How does VPN work? • Server VPN is configured to accept communications. • Client initiates contact • Server and Client connect and create a “tunnel”

  9. End-to-End tunneling Tunneling Tunneling is at the heart of all VPN implementations. There are 2 generic classes of tunnels: • Node-to-Node tunneling

  10. End-to-End Tunneling • Extends from a remote user’s PC to the server that it is connecting to • The devices at each end of the connection must handle the establishment of the tunnels • The devices must encrypt & decrypt the data passed between the 2 points

  11. Node-to-Node Tunneling • The tunnel terminates at the edge of the network. • Could be used to connect LANs in different sites. • The traffic on each LAN is unchanged. • Once traffic passes through, it is encrypted & tunneled to a similar device at the second site. • It is then decrypted & put onto the LAN

  12. = Secure tunnels

  13. Tunneling Protocols • IP Security (IPSec) • Layer 2 Tunneling Protocol (L2TP) • Point-to-Point Tunneling Protocol (PPTP) • Proprietary Tunneling Protocols

  14. Point-to-Point Tunneling Protocol • Most Widely used • Microsoft supports it within Windows • Many IT managers use it to test VPNs • Typically used in end-to-end tunneling applications

  15. Layer 2 Tunneling Protocol • Came out of a mix of the PPTP world & a tunneling protocol-Layer 2 forwarding • Developed by Cisco • Frequently used in node-to-node applications

  16. IP Security • Developed by the Internet Engineering Task Force to protect IP packets • Commonly used in both end-to-end as well as node-to-node applications • The automotive industry uses IPSec

  17. Proprietary Tunneling Protocols • Trade-off: • Standards-based approaches offer some assurance of interoperability • Proprietary approaches promise some performance enhancements • Must use one vendor’s equipment

  18. How does VPN keep the data secure? • Encryption • Private Key • Public Key • Certificate • Is encryption a friend or a foe?

  19. Remember… somebody may be watching you!

  20. Sources: • Information Week Online; “Public Key Infrastructure Becomes E-Commerce Enabler” by Larry Kahaner; March 20, 2000; • “What is VPN?”; www.rad.com/networks/1998/vpn/ • ZDNet; “A Modest Proposal” by Ray Ozzie; February 13, 2001 • Internet Week; “VPN Implementation Calls For A Tunnel Trip” by Salvatore Salamone; December 14, 1998 • The Shiva Company at www.europe.shiva.com • Tina Bird at http://kubarb.phsx.ukans.edu/ • Baltimore Technologies at www.baltimore.com

More Related