Top Banner
BY: WAQAS ANWAR
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Vpn presentation

BY:WAQAS ANWAR

Page 2: Vpn presentation

TUNNELINGFOUR PROTOCOLS USED IN VPNVPN ENCAPSULATION OF PACKETSTYPES OF IMPLEMENTATIONSVPN BASIC ARCHITECTUREADVANTAGESDIS ADVANTAGESAPPLICATIONS OF VPNINDUSTRIES THAT MAY USE A VPNSOME BUSINESSES THAT MAY USE A VPNFUTURE OF A VPN

Page 3: Vpn presentation

TunnelingA virtual point-to-point connection

made through a public network. It transports

encapsulated datagrams.

Encrypted Inner Datagram

Datagram Header Outer Datagram Data Area

Original Datagram

31-18

Page 4: Vpn presentation

Four Protocols used in VPN

PPTP -- Point-to-Point Tunneling Protocol

L2TP -- Layer 2 Tunneling Protocol

IPsec -- Internet Protocol Security

SOCKS – is not used as much as the ones above

41-18

Page 5: Vpn presentation

VPN Encapsulation of Packets

51-18

Page 6: Vpn presentation

Types of Implementations

Three Types of implementation.

Intranet – Within an organization

Extranet – Outside an organization

Remote Access – Employee to Business

61-18

Page 7: Vpn presentation

VPN Basic Architecture

71-18

Page 8: Vpn presentation

AdvantagesEliminating the need for expensive long-distance

leased lines Reducing the long-distance telephone charges for

remote access. Operational costs Flexibility of growth Efficiency with broadband technology

81-18

Page 9: Vpn presentation

DisadvantagesVPNs require an in-depth understanding of public

network security issues and proper deployment of precautions

Availability and performance depends on factors largely outside of their control

Immature standards

VPNs need to accommodate protocols other than IP and existing internal network technology

91-18

Page 10: Vpn presentation

Applications: Site-to-Site VPNs

Large-scale encryption between multiple fixed sites such as remote offices and central offices

Network traffic is sent over the branch office Internet connection

This saves the company hardware and management expenses

101-18

Page 11: Vpn presentation

Site-to-Site VPNs

111-18

Page 12: Vpn presentation

Applications: Remote Access

Encrypted connections between mobile or remote users and their corporate networks

Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server.

Ideal for a telecommuter or mobile sales people. VPN allows mobile workers & telecommuters to take

advantage of broadband connectivity. i.e. DSL, Cable

121-18

Page 13: Vpn presentation

Industries That May Use a VPN

Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider

Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely

Retail: able to securely transfer sales data or customer info between stores & the headquarters

Banking/Financial: enables account information to be transferred safely within departments & branches

General Business: communication between remote employees can be securely exchanged 131-18

Page 14: Vpn presentation

Some Businesses using a VPN

CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN

ITW Foilmark secured remote location orders, running reports, & internet/intranet communications w/ a 168-bit encryption by switching to OpenReach VPN

Bacardi & Co. Implemented a 21-country- 44-location VPN

141-18

Page 15: Vpn presentation

FUTURE OF VPNsVPNs are continually being enhanced. As the VPN market becomes larger, more applications

will be created along with more VPN providers and new VPN types.

Networks are expected to converge to create an integrated VPN

Improved protocols are expected, which will also improve VPNs.

151-18

Page 16: Vpn presentation

In my conclusion virtual private network is an, Eliminating the need for expensive long-distance leased lines Reducing the long-distance telephone charges for remote access. Transferring the support burden to the service providers Operational costs

Flexibility of growth

Efficiency with broadband technology

Page 17: Vpn presentation

1:Feilner, Markus. "Chapter 1 - VPN—Virtual Private Network". OpenVPN: Building and Integrating Virtual Private Networks: Learn How to Build Secure VPNs Using this Powerful Open Source Application. Packt Publishing.

2: Address Allocation for Private Internets, RFC 1918, Y. Rekhter et al.

3: RFC 2917, A Core MPLS IP VPN Architecture

4: Layer Two Tunneling Protocol "L2TP", RFC 2661, W. Townsley et al.

5: IP Based Virtual Private Networks, RFC 2341, A. Valencia et al

6: Point-to-Point Tunneling Protocol (PPTP), RFC 2637, K. Hamzeh et al.

7: Http://en.wikipedia.org/wiki/vpn

Page 18: Vpn presentation