Top Banner
1
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

1

Page 2: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

2

FINAL YEAR PROJECT

Page 3: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

3

IMPLEMENTATION OF VPN USING IPSEC

Page 4: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

4

GROUP MEMBERS

• M.UZAIR NASIR 2K5-CSE-153

• AHSAN EJAZ 2K5-CSE-163

• RANA.M.KAMRAN 2K5-CSE-164

• HUMAYUN KHAN 2K5-CSE-169

Page 5: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

5

VPN

• To Create a Secure tunnel over the public network (internet) is called Virtual Private Network

Page 6: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

6

VPN Types

• Overlay VPN– Layer 2 VPN

• L2TP

– Layer 3 VPN• IPSec• GRE Tunneling

• Peer-to-Peer VPN– MPLS VPN

Page 7: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

7

IPSec VPN

• IPSec is a set of security protocols and algorithms used to secure data at the network layer

Page 8: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

8

WHY WE USE IPSEC?

• IP Packets have no inherent security

• No Way To Verify – The claimed sender is a true sender– The data has not been modified in transit– The data has not been viewed by third party

• IP sec Provide Automated Solution for these areas

Page 9: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

9

IPSec Security Features

• Data Confidentiality

• Data Integrity

• Data origin Authentication

Page 10: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

10

IPSec Protocols

• IPSec uses two main protocols to create a security framework– Encapsulating Security Payload (ESP)– Authentication Header (AH)

Page 11: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

11

IPSec VPN

• We can implement IPSec VPN in different Scenario– Site-to-Site VPN– Remote Access VPN

Page 12: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

Start

Data security problem

connectivity

Different vpn

Vpn ipsec

Site-to-sitevpn

Remote vpn

End

Page 13: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

13

IMPLEMENTATION1st scenario

• PROBLEM

Site1 Site2

DATA

INTERNETINTERNET

HACKER

Data is viewed by third party

DATA

THIS IS A HUGE PROBLEM

Page 14: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

14

IMPLEMENTATION1st scenario

• SOLUTIONSite1 Site2

DATA INTERNETINTERNET

HACKER

Third party is unable to view

data

DATA

TUNNELTUNNEL VPN VPN

Page 15: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

15

IMPLEMENTATION2ND scenario

• REMOTE VPN Site

LAPTOP (MOBILE USER)

INTERNET

INTERNET

VPN

Page 16: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

16

TOOLS

• Routers (security IOS)

• VPN Concentrator

• Sniffer (ethereal)

Page 17: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

17

ADVANTAGES

• Cost Effective

• No Additional Equipment Required

• No Distance Limitation

Page 18: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

18

ANY QUESTION??

Page 19: 1. 2 FINAL YEAR PROJECT 3 IMPLEMENTATION OF VPN USING IPSEC.

19