Top Banner
Presented By: Gayatri Karmwani Kanika Gupta (MCA III Group Virtual Private Network
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Virtual Private Network main

Presented By:

Gayatri Karmwani

Kanika Gupta

(MCA III Group 1)

Virtual Private Network

Page 2: Virtual Private Network main

Introduction Private network Vs

VPN Need for

developing VPN Tunnelling Example of VPN Types of VPN VPN protocols

VPN ComponentsVPN SecurityAdvantagesDisadvantagesFuture of VPNConclusionReferences

Page 3: Virtual Private Network main

Introduction: What is a VPN?

Virtual

Private

Network

Exists as a virtual entity within a public network

Confined to a set of private users

Connects several LANs or single computers to a mainframe/LAN

Page 4: Virtual Private Network main

o It uses public telecommunication, such as the Internet, instead of leased lines to communicate.

o It provides secure information transport by authenticating users, and encrypting data.

o The Internet is used as the backbone for VPNs

Introdction Cont…

Page 5: Virtual Private Network main

Private networkPrivate network

Virtual private networkVirtual private network

Private NetworkVs

Virtual Private Network

Page 6: Virtual Private Network main

Share applications and data between offices Remote workers access office systems Reduce leased line costs Improve communication links with

suppliers and customers Maximize productivity from workers outside

the office Ensure that you are secure from outside

threats

Need For Developing VPN

Page 7: Virtual Private Network main

• Tunnelling allows transparent transfer of data over a public network.

• The heart of tunnelling is Encapsulation of the original IP packet into another packet

• Source and destination addresses of tunnel header define tunnel endpoints

• It ensures data security against unwanted viewers, or hackers.

Tunnelling

Page 8: Virtual Private Network main

STEP1

Use Of VPN

Page 9: Virtual Private Network main

»

»

STEP2

Page 10: Virtual Private Network main

STEP3

Page 11: Virtual Private Network main

STEP4

Page 12: Virtual Private Network main

Types Of VPN

Intranet VPN

Extranet VPN

Remote Access VPN

Page 13: Virtual Private Network main

• Intranet VPNs provide a link over a shared infrastructure.

• They connect: – Corporate headquarters – Remote offices – Branch offices

• Also used for e-mail and

• And sharing files

• And for sharing applications

Intranet VPN

Page 14: Virtual Private Network main

• Extranet VPNs Provide a link to a corporate Intranet over a shared infrastructure.

• They connect: – Customers – Suppliers – Partners – Other communities

of interest

Extranet VPN

Page 15: Virtual Private Network main

Remote access to mobile or remote site users.

A connection to a corporate Intranet or extranet over a public infrastructure.

Remote Access VPNs enable mobile or remote users to access resources at company headquarter locations.

Remote Access VPN

Page 16: Virtual Private Network main

PPTP (Point-to-Point tunneling protocol)

IPSec (IP Security)

L2TP (Layer 2 Transmission Protocol)

VPN Protocols

Page 17: Virtual Private Network main

VPN Components

TunnelVPN Client

VPN Server

Tunnel

VPN Connection

Tunneled Data

Transit Internetwork

Page 18: Virtual Private Network main

Firewalls

Encryption

IPSec

AAA Server

VPN Security

Page 19: Virtual Private Network main

It provides a strong barrier between your private network and the Internet.

A firewall prevents data from leaving and entering an enterprise by unauthorized users.

You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.

Firewalls

Page 20: Virtual Private Network main

• Encryption is enabled to protect data from being read by anyone except who you intend to receive and view it.

• An encryption device encrypts data before placing it on a network

• A decryption device decrypts the data before passing it to an application

• Encrypted data is called ciphered data • Data that is not encrypted is called plain text

or clear text It belongs in one of two categories:-

•symmetric-key encryption•Public-key encryption.

Encryption

Page 21: Virtual Private Network main

It provides better encryption algorithms and more comprehensive authentication.

IPSec has two encryption modes: tunnel and transport.

IPSec can encrypt data between various devices, such as: Router to router Firewall to router PC to router PC to server

IPSec

Page 22: Virtual Private Network main

Used for more secure access in a remote-access VPN environment.

AAA checks the following: Who you are (authentication) What you are allowed to do

(authorization) What you actually do (accounting)

AAA Servers(Authentication, Authorization and Accounting)

Page 23: Virtual Private Network main

• Dedicated Line Costs– Dedicated T1 Line:

• $3,600 monthly hire fee• $30 per 10km of T1 line per month

– Total Costs per Office• Office 1 – Office 2

– 3,600 + 30 x 40 = $4,800

• Office 2 – Office 3– 3,600 + 30 x 30 = $4,500

– Total Cost = $9,300

Case Study

VPN CostsInternet access fee

T1 speed link to ISP$1,900 monthly fee

Total Cost per OfficeOffice 1 – Office 2

$1,900Office 2 – Office 3

$1,900Total Costs = $3,800

Page 24: Virtual Private Network main

Cost savingScalabilityMobility Securityglobal networkingeffective bandwidth use.

Advantages

Page 25: Virtual Private Network main

Understanding of security issues. Immature standards.Reliability and performance VPN is not

under an organization's direct control.

Disadvantages

Page 26: Virtual Private Network main

• A virtual private network (VPN) uses the open, distributed infrastructure of the Internet to transmit data between corporate sites.

• Virtual private network offers cheap way to build WAN .

• The standardisation of VPN technology will lead to its wide spread use among network users.

Conclusion

Page 27: Virtual Private Network main

• http://en.wikipedia.org/wiki/Virtual_private_network• http://www.buildinglinuxvpns.net/chapter2.pdf• http://technet.microsoft.com/en-us/library/

cc786563(WS.10).aspx• http://technet.microsoft.com/en-us/library

/bb742566.aspx

References

Page 28: Virtual Private Network main