Virtual Private Network (VPN).

25
Presented by: Debasis Chowdhury – 10208016 Md. Shariar Islam 10208026 Antara Chowdhury 10208036 University of Asia Pacific

Transcript of Virtual Private Network (VPN).

Page 1: Virtual Private Network (VPN).

Presented by:

Debasis Chowdhury – 10208016Md. Shariar Islam – 10208026Antara Chowdhury – 10208036University of Asia Pacific

Page 2: Virtual Private Network (VPN).

A technology that creates a network that is physically public, but virtually private.

Page 3: Virtual Private Network (VPN).

Leased lines

Leased lines

Leased lines

Leased

lines

Page 4: Virtual Private Network (VPN).

Virtual Private Networks (VPN) Basic Architecture

Page 5: Virtual Private Network (VPN).

VIRTUAL .

PRIVATE .

NETWORK .

Page 6: Virtual Private Network (VPN).

TUNNELING.

ENCRYPTION.

ENCAPSULATION.

AUTHENTICATION.

FIREWALL.

Page 7: Virtual Private Network (VPN).

•Tunneling is the process of placing an entire packet within another packet before it's transported over the Internet.

• That outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.

Page 8: Virtual Private Network (VPN).
Page 9: Virtual Private Network (VPN).

Point-to-Point Tunneling Protocol (PPTP)

Layer Two Tunneling Protocol (L2TP) Internet Protocol Security (IPsec)

Page 10: Virtual Private Network (VPN).

Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it.

Used to convert data to a secret code for transmission over an trusted network

EncryptionAlgorithm

“The cow jumped over the moon”

“4hsd4e3mjvd3sda1d38esdf2w4d”

Clear TextClear Text Encrypted TextEncrypted Text

Page 11: Virtual Private Network (VPN).

For data encapsulation, VPN relies on either of the following technologies like GRE , IPSec, L2F,PPTP and L2TP .

In which IPsec and PPTP are more popular.

Page 12: Virtual Private Network (VPN).
Page 13: Virtual Private Network (VPN).

Authentication process determine if the sender is the authorized person and if the data has been redirect or corrupted .

There are 2 levels of Authentication.

Computer-Level Authentication User-level Authentication

Page 14: Virtual Private Network (VPN).

Firewall provides network security and business continuity .

It prevents attacks, and secures your data communications with multiple parallel Virtual Private Network (VPN) connections.

There are two approaches to using a firewall with a VPN server:

VPN server in front of the firewall..

VPN server behind the firewall..

Page 15: Virtual Private Network (VPN).
Page 16: Virtual Private Network (VPN).
Page 17: Virtual Private Network (VPN).

All traffic on the secure VPN must be encrypted and authenticated.

The security properties of the VPN must be agreed to by all parties in the VPN.

No one outside the VPN can affect the security properties of the VPN.

Page 18: Virtual Private Network (VPN).

Remote access VPNSite to Site VPN

Page 19: Virtual Private Network (VPN).

Provides access to internal corporate network over the Internet.

Reduces long distance, modem bank, and technical support costs.

InternetInternet

CorporateSite

Page 20: Virtual Private Network (VPN).

Connects multiple offices over Internet

Reduces dependencies on frame relay and leased lines

InternetInternet

BranchOffice

CorporateSite

Page 21: Virtual Private Network (VPN).

Site-to-Site VPN Extranet VPN

▪ Provides business partners access to critical information (leads, sales tools, etc)

▪ Reduces transaction and operational costs

CorporateSite

InternetInternet

Partner #1

Partner #2

Page 22: Virtual Private Network (VPN).

Site-to-Site VPN Intranet VPN:

Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.

InternetInternet

LAN clients

Database Server

LAN clients with sensitive data

Page 23: Virtual Private Network (VPN).

SecurityReliabilityCost SavingsExpand GloballyEasierNo single point of failureEasier Network Management

Page 24: Virtual Private Network (VPN).

Lower bandwidth available compared to dial-in line

Inconsistent remote access performance due to changes in Internet connectivity

No entrance into the network if the Internet connection is broken

Page 25: Virtual Private Network (VPN).