1 / 38

VPN: Virtual Private Network

VPN: Virtual Private Network. Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan. INTRODUCTION. What is a VPN?. Introduction: What is a VPN?. Virtual Private Network. Introduction to VPN. Introduction (continued):. Four Categories: Trusted VPN

mccrady
Télécharger la présentation

VPN: Virtual Private Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan

  2. INTRODUCTION What is a VPN?

  3. Introduction: What is a VPN? • Virtual • Private • Network

  4. Introduction to VPN

  5. Introduction (continued): • Four Categories: • Trusted VPN • Secure VPN • Hybrid VPN • Provider-provisioned VPN

  6. VPN TOPOLOGY How does a VPN work?

  7. VPN Topology: Types of VPNs • Remote access VPN • INTRANET • Extranet VPN

  8. VPN Topology: Remote Access VPN

  9. Intranet VPN • An intranet is a private network accessible only to an organization's staff.[1][2] Often, a wide range of information and services are available on an organization's internal intranet that are unavailable to the public, unlike the Internet. A company-wide intranet can constitute an important focal point of internal communication and collaboration, and provide a single starting point to access internal and external resources. In its simplest form, an intranet is established with the technologies for local area networks (LANs) and wide area networks(WANs).[3][4][5]

  10. VPN Topology: Intranet VPN

  11. EXTRANET • An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorized parties, without granting access to an organization's entire network. An extranet is a private network organization.

  12. VPN Topology: Extranet VPN

  13. VPN Topology: Advantages and Disadvantages of VPN • Advantages: • Greater scalability • Easy to add/remove users • Reduced long-distance telecommunications costs • Mobility • Security

  14. VPN Topology: Advantages and Disadvantages of VPN • Disadvantages • Lack of standards • Understanding of security issues • Unpredictable Internet traffic • Difficult to accommodate products from different vendors

  15. VPN Topology: What is needed? • Existing hardware (Servers, workstations,…) • Internet connection • VPN - Router/Switch • Software to create and manage tunnels • Security Device such as firewall

  16. VPN Topology: How it works • Operates at layer 2 or 3 of OSI model • Layer 2 frame – Ethernet • Layer 3 packet – IP • Tunneling • allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet • to ensure data security against unwanted viewers, or hackers.

  17. VPN COMPONENTS What are the components of VPN?

  18. VPN Components • Protocols • Security • Appliances

  19. VPN Components: Protocols • IP Security (IPSec) • Transport mode • Tunnel mode • Point-to-Point Tunneling Protocol (PPTP) • Voluntary tunneling method • Uses PPP (Point-to-Point Protocol)

  20. VPN Components: Protocols • Layer 2 Tunneling Protocol (L2TP) • Exists at the data link layer of OSI • Composed from PPTP and L2F (Layer 2 Forwarding) • Compulsory tunneling method

  21. Example of packet encapsulation

  22. VPN Components: Security • Encryption • Technique for scrambling and unscrambling information • Unscramble – called clear-text • Scrambled information – cipher-text

  23. VPN Components: Security • Keys • Secret code that the encryption algorithm uses to create a unique version of cipher-text • 8-bits keys = 256 combinations or two to the eighth power • 16-bits keys = 65,536 combinations or two to the 16th power • 56-bits keys = 72,057,594,037,927,900 or two to the 56th power • 168-bits keys …

  24. VPN Components: Security • Authentication • Determine if the sender is the authorized person and if the data has been redirect or corrupted • User/System Authentication • Data Authentication

  25. VPN Components: Appliances • Intrusion detection firewalls • Monitors traffic crossing network parameters and protects enterprises from unauthorized access • Packet-level firewall checks source and destination • Application-level firewall acts as a host computer between the organization’s network and the Internet

  26. VPN PRODUCTIVITY AND COST BENEFITS How can companies benefit from VPN?

  27. VPN Productivity and Cost Benefits: Benefits • Extends geographic connectivity • Boosts employee productivity • Improves Internet security • Scales easily

  28. VPN Productivity and Cost Benefit: Costs • Costs associated with implementing VPN • In House implementation • Outsourced implementation • Middle Ground implementation

  29. QUALITY OF SERVICE (QoS) WHAT IS QoS?

  30. What is QoS?

  31. VPN Productivity and Cost Benefits: Quality of Service • Question: “Do I get acceptable response times when I access my mission critical applications from a remote office?”

  32. QoS Options • Two models are available for QoS functionality: • Differentiated Services Model (DiffServ) • Integrated Services Model (IntServ)

  33. Differentiated Services Model (DiffServ)

  34. Integrated Services Model (IntServ)

  35. THE FUTURE OF VPN Where is VPN headed?

  36. Future of VPN • VPN popularity • Companies choosing VPN • Cost efficient? • New way of communicating?

  37. Future of VPN: Companies with VPN

  38. CONCLUSION Any questions?

More Related