Virtual Private Network main

download Virtual Private Network main

of 28

  • date post

    12-Aug-2015
  • Category

    Documents

  • view

    93
  • download

    0

Embed Size (px)

Transcript of Virtual Private Network main

  1. 1. Presented By: Gayatri Karmwani Kanika Gupta (MCA III Group 1) Virtual Private Network
  2. 2. Introduction Private network Vs VPN Need for developing VPN Tunnelling Example of VPN Types of VPN VPN protocols VPN Components VPN Security Advantages Disadvantages Future of VPN Conclusion References
  3. 3. Introduction: What is a VPN? Virtual Private Network Exists as a virtual entity within a public network Confined to a set of private users Connects several LANs or single computers to a mainframe/LAN
  4. 4. o It uses public telecommunication, such as the Internet, instead of leased lines to communicate. o It provides secure information transport by authenticating users, and encrypting data. o The Internet is used as the backbone for VPNs Introdction Cont
  5. 5. Private networkPrivate network Virtual private networkVirtual private network Private Network Vs Virtual Private Network
  6. 6. Share applications and data between offices Remote workers access office systems Reduce leased line costs Improve communication links with suppliers and customers Maximize productivity from workers outside the office Ensure that you are secure from outside threats Need For Developing VPN
  7. 7. Tunnelling allows transparent transfer of data over a public network. The heart of tunnelling is Encapsulation of the original IP packet into another packet Source and destination addresses of tunnel header define tunnel endpoints It ensures data security against unwanted viewers, or hackers. Tunnelling
  8. 8. STEP1 Use Of VPN
  9. 9. STEP2
  10. 10. STEP3
  11. 11. STEP4
  12. 12. Types Of VPN Intranet VPN Extranet VPN Remote Access VPN
  13. 13. Intranet VPNs provide a link over a shared infrastructure. They connect: Corporate headquarters Remote offices Branch offices Also used for e-mail and And sharing files And for sharing applications Intranet VPN
  14. 14. Extranet VPNs Provide a link to a corporate Intranet over a shared infrastructure. They connect: Customers Suppliers Partners Other communities of interest Extranet VPN
  15. 15. Remote access to mobile or remote site users. A connection to a corporate Intranet or extranet over a public infrastructure. Remote Access VPNs enable mobile or remote users to access resources at company headquarter locations. Remote Access VPN
  16. 16. PPTP (Point-to-Point tunneling protocol) IPSec (IP Security) L2TP (Layer 2 Transmission Protocol) VPN Protocols
  17. 17. VPN Components TunnelVPN Client VPN Server Tunnel VPN Connection Tunneled Data Transit Internetwork
  18. 18. Firewalls Encryption IPSec AAA Server VPN Security
  19. 19. It provides a strong barrier between your private network and the Internet. A firewall prevents data from leaving and entering an enterprise by unauthorized users. You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through. Firewalls
  20. 20. Encryption is enabled to protect data from being read by anyone except who you intend to receive and view it. An encryption device encrypts data before placing it on a network A decryption device decrypts the data before passing it to an application Encrypted data is called ciphered data Data that is not encrypted is called plain text or clear text It belongs in one of two categories:- symmetric-key encryption Public-key encryption. Encryption
  21. 21. It provides better encryption algorithms and more comprehensive authentication. IPSec has two encryption modes: tunnel and transport. IPSec can encrypt data between various devices, such as: Router to router Firewall to router PC to router PC to server IPSec
  22. 22. Used for more secure access in a remote-access VPN environment. AAA checks the following: Who you are (authentication) What you are allowed to do (authorization) What you actually do (accounting) AAA Servers (Authentication, Authorization and Accounting)
  23. 23. Dedicated Line Costs Dedicated T1 Line: $3,600 monthly hire fee $30 per 10km of T1 line per month Total Costs per Office Office 1 Office 2 3,600 + 30 x 40 = $4,800 Office 2 Office 3 3,600 + 30 x 30 = $4,500 Total Cost = $9,300 Case Study VPN Costs Internet access fee T1 speed link to ISP $1,900 monthly fee Total Cost per Office Office 1 Office 2 $1,900 Office 2 Office 3 $1,900 Total Costs = $3,800
  24. 24. Cost saving Scalability Mobility Security global networking effective bandwidth use. Advantages
  25. 25. Understanding of security issues. Immature standards. Reliability and performance VPN is not under an organization's direct control. Disadvantages
  26. 26. A virtual private network (VPN) uses the open, distributed infrastructure of the Internet to transmit data between corporate sites. Virtual private network offers cheap way to build WAN . The standardisation of VPN technology will lead to its wide spread use among network users. Conclusion
  27. 27. http://en.wikipedia.org/wiki/Virtual_private_network http://www.buildinglinuxvpns.net/chapter2.pdf http://technet.microsoft.com/en- us/library/cc786563(WS.10).aspx http://technet.microsoft.com/en-us/library /bb742566.aspx References