1 / 14

VPN’s

VPN’s. Kristin Belanger. VPN’s. Accommodate employees at distant offices Usually set up through internet Pass secure information through a tunnel on the internet Cost savings. Benefits. Improved productivity Global network opportunities Telecommuter support. Types of VPN’s.

Télécharger la présentation

VPN’s

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VPN’s Kristin Belanger

  2. VPN’s • Accommodate employees at distant offices • Usually set up through internet • Pass secure information through a tunnel on the internet • Cost savings

  3. Benefits • Improved productivity • Global network opportunities • Telecommuter support

  4. Types of VPN’s • Remote Access VPN • Extranet VPN • Intranet VPN

  5. Remote Access • User-to-LAN connection • Some need ESP (Enterprise Service Provider • Sets up a Network Access Server • Users have desktop client software

  6. Site-to-Site • Two types: Intranet and Extranet • Intranet: Can connect a LAN to a LAN • Extranet: with another company

  7. Safe and Secure • Recommended hardware: • Firewall • Encryption • IPSec • AAA server

  8. IPSec • Internet Protocol Security Protocol • Aids in encryption • Enhance algorithms • Two types: tunnel and transport • Tunnel: encrypts header and payload • Transport: payload

  9. AAA Server • Authentication, authorization, accounting • Secure for remote-access VPN environments • Help with auditing, billing, reports

  10. Software • Desktop client software • Dedicated hardware (VPN concentrator, PIX firewall) • Dedicated VPN server for dial up • NAS server • VPN network and policy-management center • No protocol

  11. Tunneling Protocol • Carrier protocol • Network tunnel is established on • Encapsulation protocol • Packet that wraps itself around the original data • Passenger protocol • The original data itself

  12. NMMC • VPN’s for select physicians • VPN’s for employees • VPN’s for other offices

  13. Problem with VPN • Only one computer can be connected through the VPN at one time • Can’t have two computers on one Internet connection trying to create tunnel • Need two different internet lines in order to make tunnel work all of the time

  14. Questions?

More Related