Vpn
-
Upload
swarup-kumar-mall -
Category
Documents
-
view
636 -
download
3
description
Transcript of Vpn
![Page 1: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/1.jpg)
VPN: Virtual Private Network
Presented by:Germaine Bacon
Lizzi BeduyaBetty HuangJun MitsuokaJuliet Polintan
![Page 2: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/2.jpg)
INTRODUCTION
What is a VPN?
![Page 3: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/3.jpg)
Introduction: What is a VPN?
Virtual
Private
Network
![Page 4: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/4.jpg)
Introduction to VPN
![Page 5: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/5.jpg)
Introduction (continued):
Four Categories:• Trusted VPN
• Secure VPN
• Hybrid VPN
• Provider-provisioned VPN
![Page 6: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/6.jpg)
VPN TOPOLOGY
How does a VPN work?
![Page 7: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/7.jpg)
VPN Topology: Types of VPNs
Remote access VPN Intranet VPN Extranet VPN
![Page 8: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/8.jpg)
VPN Topology: Remote Access VPN
![Page 9: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/9.jpg)
VPN Topology: Intranet VPN
![Page 10: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/10.jpg)
VPN Topology: Extranet VPN
![Page 11: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/11.jpg)
VPN Topology: Advantages and Disadvantages of VPN
Advantages:• Greater scalability
• Easy to add/remove users
• Reduced long-distance telecommunications costs
• Mobility
• Security
![Page 12: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/12.jpg)
VPN Topology: Advantages and Disadvantages of VPN
Disadvantages • Lack of standards
• Understanding of security issues
• Unpredictable Internet traffic
• Difficult to accommodate products from different vendors
![Page 13: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/13.jpg)
VPN Topology: What is needed?
Existing hardware (Servers, workstations,…) Internet connection VPN - Router/Switch Software to create and manage tunnels Security Device such as firewall
![Page 14: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/14.jpg)
VPN Topology: How it works
Operates at layer 2 or 3 of OSI model• Layer 2 frame – Ethernet
• Layer 3 packet – IP Tunneling
• allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet
• to ensure data security against unwanted viewers, or hackers.
![Page 15: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/15.jpg)
VPN COMPONENTS
What are the components of VPN?
![Page 16: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/16.jpg)
VPN Components
Protocols Security Appliances
![Page 17: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/17.jpg)
VPN Components: Protocols
IP Security (IPSec)• Transport mode
• Tunnel mode
Point-to-Point Tunneling Protocol (PPTP)• Voluntary tunneling method
• Uses PPP (Point-to-Point Protocol)
![Page 18: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/18.jpg)
VPN Components: Protocols
Layer 2 Tunneling Protocol (L2TP)• Exists at the data link layer of OSI
• Composed from PPTP and L2F (Layer 2 Forwarding)
• Compulsory tunneling method
![Page 19: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/19.jpg)
Example of packet encapsulation
![Page 20: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/20.jpg)
VPN Components: Security
Encryption• Technique for scrambling and unscrambling
information
• Unscramble – called clear-text
• Scrambled information – cipher-text
![Page 21: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/21.jpg)
VPN Components: Security
Keys• Secret code that the encryption algorithm uses to
create a unique version of cipher-text
• 8-bits keys = 256 combinations or two to the eighth power
• 16-bits keys = 65,536 combinations or two to the 16th power
• 56-bits keys = 72,057,594,037,927,900 or two to the 56th power
• 168-bits keys …
![Page 22: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/22.jpg)
VPN Components: Security
Authentication• Determine if the sender is the authorized
person and if the data has been redirect or corrupted
• User/System Authentication
• Data Authentication
![Page 23: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/23.jpg)
VPN Components: Appliances
Intrusion detection firewalls• Monitors traffic crossing network parameters
and protects enterprises from unauthorized access
• Packet-level firewall checks source and destination
• Application-level firewall acts as a host computer between the organization’s network and the Internet
![Page 24: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/24.jpg)
VPN PRODUCTIVITY AND COST BENEFITS
How can companies benefit from VPN?
![Page 25: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/25.jpg)
VPN Productivity and Cost Benefits: Benefits
Extends geographic connectivity Boosts employee productivity Improves Internet security Scales easily
![Page 26: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/26.jpg)
VPN Productivity and Cost Benefit: Costs
Costs associated with implementing VPN• In House implementation
• Outsourced implementation
• Middle Ground implementation
![Page 27: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/27.jpg)
QUALITY OF SERVICE (QoS)
WHAT IS QoS?
![Page 28: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/28.jpg)
What is QoS?
![Page 29: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/29.jpg)
VPN Productivity and Cost Benefits: Quality of Service
Question: “Do I get acceptable response times when I access my mission critical applications from a remote office?”
![Page 30: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/30.jpg)
QoS Options
Two models are available for QoS functionality:
• Differentiated Services Model (DiffServ)
• Integrated Services Model (IntServ)
![Page 31: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/31.jpg)
Differentiated Services Model (DiffServ)
![Page 32: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/32.jpg)
Integrated Services Model (IntServ)
![Page 33: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/33.jpg)
THE FUTURE OF VPN
Where is VPN headed?
![Page 34: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/34.jpg)
Future of VPN
VPN popularity• Companies choosing VPN
• Cost efficient?
• New way of communicating?
![Page 35: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/35.jpg)
Future of VPN: Companies with VPN
![Page 36: Vpn](https://reader033.fdocuments.us/reader033/viewer/2022061211/549208ebb47959c1418b45a2/html5/thumbnails/36.jpg)
CONCLUSION
Any questions?