1 / 20

Virtual Private Networks

Virtual Private Networks. Ed Wagner CS 7493. Overview. Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion. Introduction. Virtual Private Network

rhonda
Download Presentation

Virtual Private Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtual Private Networks Ed Wagner CS 7493

  2. Overview • Introduction • Types of VPNs • Encrypting and Tunneling • Pro/Cons the VPNs • Conclusion

  3. Introduction • Virtual Private Network • a secure network that uses primarily public telecommunication infrastructures, such as the internet, to provide remote offices or traveling users an access to a centralized organizational network.

  4. Types of VPNs • PPTP • IPSEC • L2TP • OpenVPN (SSL) • Hybrid VPN • MPLS VPN

  5. PPTP • Point to Point Tunneling Protocol • The most common and widely used VPN. • Defined in RFC 2637, in 1999 • Developed by Microsof and 3com. • PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. • PPTP does not specified encryption or authentication. • Security and authentication provided by the Microsoft PPTP software stack. • Authentication and Encryption • Authentication - MS-CHAPv2 • Encryption - Microsoft Point to Point Encryption (MPPE) - RC4 stream cipher

  6. PPTP • Pros/Cons of PPTP + Cheap to setup - not as secure + pre-existing technology - security not native

  7. IPSEC • Internet Protocol Security Protocol • a protocol suite for securing IP communications by authenticating and encrypting each IP packet. • Developed at the Naval Research Lab. • Operates in the OSI layer 3, much lower than other VPN protocols. • 2 modes of transmission: • Tunnel - entire packet is encrypted , then encapsulated in a new ip packet. • used in network to network vpns, and host to network vpn • NAT transversal • Transport - Only the payload of the IP packet is encrypted • When the authentication header effects routing, use NAT-T

  8. IPSEC Pros/Cons of IPSEC + Highest security + when used with l2tp, data is encapsulated twice. - harder to setup - possible routing issues - requires more processing power

  9. L2TP • Layer 2 Tunneling Protocol • a tunneling protocol used to support vpns. • does not provide any encryption or authentication • usually used encrypted with IPsec. • Proposed in 1999, RFC 2661 • Entire packet, both header and payload are sent as a UDP packet on port 1701.

  10. L2TP • Pros/Cons of L2TP + native windows support + feature rich backend allows use of other protocols - No native security - slower than other vpn sources

  11. OpenVPN • An open source software applications that implements VPN techniques for creating secure point to point or site to site connections in routed/bridged networks • Created in 2002, by James Yonan • Uses SSL for encryption • Authentication is done with pre-shared keys

  12. OpenVPN • Pros/Cons of OpenVPN • + great community support • + free • + easy to setup • - SSL can require more processing power.

  13. Hybrid VPNs • Hybrid VPN servers are able to accept connections from multiple types of VPN clients. • For example, combining the features of SSL and IPSEC

  14. Hybrid VPNS Pros/Cons of Hybrid + Ability to use different protocols to provide greater usage. - expensive to implement.

  15. MPLS VPN • Multi-Protocol Label Switching • a family of methods for harnessing the power of multiprotocol label switching to create VPNs. • MPLS VPNs give network engineers the flexibility to transport and route several types of network traffic using the technologies of a MPLS backbone • Related to telecommunication standards

  16. MPLS Pros/Cons of MPLS + use of different network technologies to provide a VPN network. - Not easy to setup.

  17. Encrypting and Tunneling • Encrypting • Encoding a packet of information using a known and tested algorithm. • Ex: IPsec, MPPE • Tunneling • Creating a path where all packets are routed to the next path in the circuit, whether encrypted or not. • Ex: L2TP, PPTP (not with MPPE)

  18. Conclusion There are various options for VPNs. The major factors for an SA setting up a VPN network would be the Needs for Mobility, the complexity of security, and the expense that will be used to implement the VPN

  19. Questions?

  20. Works cited • http://en.wikipedia.org/wiki/Virtual_private_network • http://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol • http://techpp.com/2010/07/16/different-types-of-vpn-protocols/ • http://www.alliancedatacom.com/how-vpn-works.asp • http://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol • http://en.wikipedia.org/wiki/OpenVPN

More Related