Virtual private network- VPN

13
Prepared by : Nikhil Kumar Enroll no- 0511EC111056 EC-5 th Semester NIRT Bhopal NRI GROUP OF INSTITUTION

description

Virtual private network

Transcript of Virtual private network- VPN

Page 1: Virtual private network- VPN

Prepared by : Nikhil Kumar Enroll no- 0511EC111056 EC-5th Semester NIRT Bhopal

NRI GROUP OF INSTITUTION

Page 2: Virtual private network- VPN

Virtual Private Network

Click icon to add picture

Page 3: Virtual private network- VPN
Page 4: Virtual private network- VPN

Introduction The word VPN originates from three words i.e.

Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there.

Private: Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.

Network: A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.

Page 5: Virtual private network- VPN

Basic VPN Requirement :

User Authentication : VPN must be able to verify user authentication and allow only authorized users to access the network

Address Management : Assign addresses to clients and ensure that private addresses are kept private on the VPN.

Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data

Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note that keys are required for encryption

Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP, IPX etc.

Page 6: Virtual private network- VPN

Types of VPN :

Remote access VPN.

Intranet VPN.

Extranet VPN.

Page 7: Virtual private network- VPN

Remote Access VPN Enables mobile users to establish a connection to an organization

server by using the infrastructure provided by an ISP (Internet Services Provider)

Allows users to connect to their corporate intranets or extranets wherever or whenever is needed & access to all the resources on the organization’s network as if they are physically located in organization.

The user connects to a local ISP that supports VPN using plain old telephone services (POTS), integrated services digital network (ISDN), digital subscriber line (DSL), etc. The VPN device at the ISP accepts the user’s login, then establishes the tunnel to the VPN device at the organization’s office and finally begins forwarding packets over the Internet.

Remote access VPN offers advantages such as:

•Reduced capital costs associated with modem and terminal server equipment

•Greater scalability and easy to add new users

•Reduced long-distance telecommunications costs, nationwide toll-free 800 number is no longer needed to connect to the organization’s modems

Page 8: Virtual private network- VPN

Intranet VPN

Provides virtual circuits between organization offices over the Internet (see figure ). They are built using the Internet, service provider IP, Frame Relay, or ATM networks.

An IP WAN infrastructure uses IPsec or GRE to create secure traffic tunnels across the network.

Benefits of an intranet VPN include the following:

•Reduced WAN bandwidth costs, efficient use of WAN bandwidth

•Flexible topologies

•Congestion avoidance with the use of bandwidth management traffic shaping

Page 9: Virtual private network- VPN

Extranet VPN

The concept of setting up extranet VPNs are the same as intranet VPN. The only difference is the users.

Extranet VPN are built for users such as customers, suppliers, or different organizations over the Internet. See Figure.

Page 10: Virtual private network- VPN

Tunneling :

Tunnelling involves the encapsulation, transmission and de-capsulation of data packets.

The data is encapsulated with additional headers.

The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel.

Requires 3 protocols

1) Carrier, Default network protocol

2) Passenger ,Original data

3) Encapsulation GRE, IPsec , PPTP etc.

Page 11: Virtual private network- VPN

Tunnel Types :

Voluntary VPN request is initiated by the client. The client remains the end point.

Compulsory VPN access server creates a compulsory tunnel for the client. In this case, the dial-up access server between the user’s computer and the tunnel

server is the tunnel end point that acts as a client . Voluntary tunneling is used in most applications.

Page 12: Virtual private network- VPN

Advantages and Disadvantages of VPN :

Advantages : Greater scalability Easy to add/remove users Reduced long-distance

telecommunications costs Mobility Security

Disadvantages : Lack of standards Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from

different vendors

Page 13: Virtual private network- VPN

THANKS