presentation on vpn

48
© ARNAB CHATTERJEE

Upload: arnab-chatterjee

Post on 08-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 1/48

© ARNAB CHATTERJEE

Page 2: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 2/48

© ARNAB CHATTERJEE

Page 3: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 3/48

© ARNAB CHATTERJEE

Page 4: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 4/48

© ARNAB CHATTERJEE

Page 5: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 5/48

© ARNAB CHATTERJEE

Page 6: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 6/48

VPN

VIRTUAL PRIVATE NETWORK 

Presented by:

Arnab Chatterjee. (19008)Krishna Kumar Yadav. (19018)

Copyrights reserved© 2011: Arnab Chatterjee.

Page 7: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 7/48

ARNAB CHATTERJEEPresents:

� What is VPN?

� VPN components.

� Types of VPN.

Copyrights reserved© 2011: Arnab Chatterjee.

Page 8: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 8/48

 WHAT IS VPN?

Virtual Private Network is a type of private network that uses public

telecommunication, such as the Internet,

instead of leased lines to communicate.

Copyrights reserved© 2011: Arnab Chatterjee.

Page 9: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 9/48

TRADITIONAL CONNECTIVITY 

Public networks are used to move information between

trusted network segments using shared facilities like frame

relay or atm

Copyrights reserved© 2011: Arnab Chatterjee.

Page 10: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 10/48

 VPN COMPONENTS

�Protocols�Security

�Appliances

Copyrights reserved© 2011: Arnab Chatterjee.

Page 11: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 11/48

� Protocols

� IP Security (IPSec)

±Transport mode

±Tunnel mode

Point-to-Point Tunneling Protocol (PPTP)±Voluntary tunneling method

±Uses PPP (Point-to-Point Protocol)

 VPN COMPONENTS

Copyrights reserved© 2011: Arnab Chatterjee.

Page 12: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 12/48

� Protocols

� Layer 2 Tunneling Protocol (L2TP)

±Exists at the data link layer of OSI

±Composed from PPTP and L2F (Layer 2

Forwarding)±Compulsory tunneling method

 VPN COMPONENTS

Copyrights reserved© 2011: Arnab Chatterjee.

Page 13: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 13/48

� Security:

� Encryption

±Technique for scrambling and

unscrambling information

±Unscramble called clear-text

±Scrambled information cipher-text

 VPN COMPONENTS

Copyrights reserved© 2011: Arnab Chatterjee.

Page 14: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 14/48

 VPN COMPONENTS� Security:� Keys

±

Secret code that the encryption algorithm uses tocreate a unique version of cipher-text

± 8-bits keys = 256 combinations or two to the eighthpower

± 16-bits keys = 65,536 combinations or two to the 16th

power

± 56-bits keys = 72,057,594,037,927,900 or two to the56th power

± 168-bits keys.

Copyrights reserved© 2011: Arnab Chatterjee.

Page 15: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 15/48

� Authentication

±Determine if the sender is the authorizedperson and if the data has been redirect or

corrupted

±

User/System Authentication±Data Authentication

 VPN COMPONENTS

Copyrights reserved© 2011: Arnab Chatterjee.

Page 16: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 16/48

� Appliances.� Intrusion detection firewalls

±Monitors traffic crossing network parametersand protects enterprises from unauthorizedaccess

± Packet-level firewall checks source and

destination± Application-level firewall acts as a host

computer between the organizations networkand the Internet.

 VPN COMPONENTS

Copyrights reserved© 2011: Arnab Chatterjee.

Page 17: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 17/48

 TYPES OF VPN

Copyrights reserved© 2011: Arnab Chatterjee.

Page 18: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 18/48

KRISHNA KUMAR YADAV

Presents:

� How VPN works?

� Benefits of VPN.

Page 19: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 19/48

How VPN Work«?

Two connections ± One is made to the Internet andthe second is made to the VPN.

Data grams ± It contains data, destination and sourceinformation.

Firewalls ± VPNs allow authorized users to pass

through the firewalls.

Protocols ± Protocols create the VPN tunnels.

Page 20: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 20/48

Page 21: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 21/48

Four Critical Functions

Authentication ± It validates that the data was sentfrom the sender.

Access control ± It limiting unauthorized users from

accessing the network.Confidentiality ±  It preventing the data to be read or 

copied as the data is being transported.

Data Integrity ± It ensuring that the data has not

been altered.

Page 22: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 22/48

EncryptionEncryption

Encryption - is a method of ³scrambling´ data before

transmitting it onto the Internet.

Public Key Encryption Technique

Digital signature ± for authentication

Page 23: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 23/48

Tunneling

A virtual point-to-point connection

made through a public network. It transports

encapsulated data grams.

Encrypted Inner Datagram

Datagram Header Outer Datagram Data Area

Original Datagram

Data Encapsulation [From Comer]

Page 24: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 24/48

VPN Productivity and Cost Benefits

Extends geographic connectivity..

Boosts employee productivity.

Improves Internet security.

Scales easily.

Costs associated with implementing VPN

± In House implementation

± Outsourced implementation

± Middle Ground implementation

Page 25: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 25/48

Advantages 

VS.

Disadvantages

Page 26: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 26/48

Advantages: Cost Savings

� Eliminating the need for expensive long-distance

leased lines

� Reducing the long-distance telephone charges for

remote access.

� Transferring the support burden to the service

providers

Operational costs

Page 27: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 27/48

Disadvantages

VPNs require an in-depth understanding of publicnetwork security issues and proper deployment of precautions

Availability and performance depends on factorslargely outside of their control

Immature standards

VPNs need to accommodate protocols other than IPand existing internal network technology

Page 28: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 28/48

Applications: Site-to-Site VPNs

Large-scale encryption between multiple fixedsites such as remote offices and central offices

Network traffic is sent over the branch officeInternet connection

This saves the company hardware andmanagement expenses

Page 29: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 29/48

Site-to-Site VPNs

Page 30: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 30/48

Applications: Remote Access

Encrypted connections between mobile or remote

users and their corporate networks

Remote user can make a local call to an ISP, as

opposed to a long distance call to the corporateremote access server.

Ideal for a telecommuter or mobile sales people.

VPN allows mobile workers & telecommuters to take

advantage of broadband connectivity.i.e. DSL, Cable

Page 31: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 31/48

Industries That May Use a VPN

Healthcare: enables the transferring of confidential patient informationwithin the medical facilities & health care provider

Manufacturing: allow suppliers to view inventory & allow clients topurchase online safely

Retail: able to securely transfer sales data or customer info between stores& the headquarters

Banking/Financial: enables account information to be transferred safelywithin departments & branches

General Business: communication between remote employees can besecurely exchanged

Page 32: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 32/48

Statistics From Gartner-Consulting*

50%

63%

79%

90%

0% 20% 40% 60% 80% 100%

Access etwork for

bus ess

artners/customers

S te-to-s te connectivity

between offices

R emote access for

employee s while

traveling

R emote access for

employee s working out

of homes

% of R espondents

ercentages

*Source: www.cisco.com

Page 33: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 33/48

Some Businesses using a VPN

CVS Pharmaceutical Corporation upgraded theirframe relay network to an IP VPN

ITW Foilmark secured remote location orders,running reports, & internet/intranet communicationsw/ a 168-bit encryption by switching to OpenReachVPN

Bacardi & Co. Implemented a 21-country, 44-location VPN

Page 34: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 34/48

Where Do We See VPNs Going in the 

Future?

VPNs are continually being enhanced.

Example: Equant NV

As the VPN market becomes larger, moreapplications will be created along with more

VPN providers and new VPN types.

Networks are expected to converge to create

an integrated VPN

Improved protocols are expected, which will

also improve VPNs.

Page 35: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 35/48

� DEMONSTRATION TO SET UP VPN

ARNAB CHATTERJEE

Page 36: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 36/48

In Network

Connections on the

left hand side there

is a link to Create

New Connection click on this and a

wizard will pop up

assisting the user

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 37: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 37/48

Select Connect

to the Network

at my

Workplace

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 38: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 38/48

Select Virtual

Private

Network

Connection

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 39: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 39/48

Make a name for this

connection that you

are establishing to

distinguish this

connection fromother VPN

connections that

might already be

established

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 40: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 40/48

Page 41: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 41/48

Personal preference

as to whether or not

you want other

users to be able to

use this VPNconnection on this

computer

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 42: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 42/48

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 43: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 43/48

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 44: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 44/48

This is a profile (username

and password) that has

already been created on

your router which can be

created by typing in the IPaddress of your router in a

web browser

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 45: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 45/48

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 46: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 46/48

In Start Run insert the IPaddress of the computer that

you want to access that is

connected to the router

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 47: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 47/48

Using the same username

and password already

established for the router

you can connect to thisspecific computer

VPN Demonstration

Copyrights reserved© 2011: Arnab Chatterjee.

Page 48: Presentation on  VPN

8/7/2019 Presentation on VPN

http://slidepdf.com/reader/full/presentation-on-vpn 48/48

These are only the files that are shared on this computer

Copyrights reserved© 2011: Arnab Chatterjee

VPN

 VPN Demonstration