virtual private network main

28
Presented By: Gayatri Karmwani Kanika Gupta (MCA III Group Virtual Private Network

Upload: kanika-gupta

Post on 12-Aug-2015

114 views

Category:

Documents


0 download

TRANSCRIPT

Presented By:

Gayatri Karmwani

Kanika Gupta

(MCA III Group 1)

Virtual Private Network

Introduction Private network Vs

VPN Need for

developing VPN Tunnelling Example of VPN Types of VPN VPN protocols

VPN ComponentsVPN SecurityAdvantagesDisadvantagesFuture of VPNConclusionReferences

Introduction: What is a VPN?

Virtual

Private

Network

Exists as a virtual entity within a public network

Confined to a set of private users

Connects several LANs or single computers to a mainframe/LAN

o It uses public telecommunication, such as the Internet, instead of leased lines to communicate.

o It provides secure information transport by authenticating users, and encrypting data.

o The Internet is used as the backbone for VPNs

Introdction Cont…

Private networkPrivate network

Virtual private networkVirtual private network

Private NetworkVs

Virtual Private Network

Share applications and data between offices Remote workers access office systems Reduce leased line costs Improve communication links with

suppliers and customers Maximize productivity from workers outside

the office Ensure that you are secure from outside

threats

Need For Developing VPN

• Tunnelling allows transparent transfer of data over a public network.

• The heart of tunnelling is Encapsulation of the original IP packet into another packet

• Source and destination addresses of tunnel header define tunnel endpoints

• It ensures data security against unwanted viewers, or hackers.

Tunnelling

STEP1

Use Of VPN

»

»

STEP2

STEP3

STEP4

Types Of VPN

Intranet VPN

Extranet VPN

Remote Access VPN

• Intranet VPNs provide a link over a shared infrastructure.

• They connect: – Corporate headquarters – Remote offices – Branch offices

• Also used for e-mail and

• And sharing files

• And for sharing applications

Intranet VPN

• Extranet VPNs Provide a link to a corporate Intranet over a shared infrastructure.

• They connect: – Customers – Suppliers – Partners – Other communities

of interest

Extranet VPN

Remote access to mobile or remote site users.

A connection to a corporate Intranet or extranet over a public infrastructure.

Remote Access VPNs enable mobile or remote users to access resources at company headquarter locations.

Remote Access VPN

PPTP (Point-to-Point tunneling protocol)

IPSec (IP Security)

L2TP (Layer 2 Transmission Protocol)

VPN Protocols

VPN Components

TunnelVPN Client

VPN Server

Tunnel

VPN Connection

Tunneled Data

Transit Internetwork

Firewalls

Encryption

IPSec

AAA Server

VPN Security

It provides a strong barrier between your private network and the Internet.

A firewall prevents data from leaving and entering an enterprise by unauthorized users.

You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.

Firewalls

• Encryption is enabled to protect data from being read by anyone except who you intend to receive and view it.

• An encryption device encrypts data before placing it on a network

• A decryption device decrypts the data before passing it to an application

• Encrypted data is called ciphered data • Data that is not encrypted is called plain text

or clear text It belongs in one of two categories:-

•symmetric-key encryption•Public-key encryption.

Encryption

It provides better encryption algorithms and more comprehensive authentication.

IPSec has two encryption modes: tunnel and transport.

IPSec can encrypt data between various devices, such as: Router to router Firewall to router PC to router PC to server

IPSec

Used for more secure access in a remote-access VPN environment.

AAA checks the following: Who you are (authentication) What you are allowed to do

(authorization) What you actually do (accounting)

AAA Servers(Authentication, Authorization and Accounting)

• Dedicated Line Costs– Dedicated T1 Line:

• $3,600 monthly hire fee• $30 per 10km of T1 line per month

– Total Costs per Office• Office 1 – Office 2

– 3,600 + 30 x 40 = $4,800

• Office 2 – Office 3– 3,600 + 30 x 30 = $4,500

– Total Cost = $9,300

Case Study

VPN CostsInternet access fee

T1 speed link to ISP$1,900 monthly fee

Total Cost per OfficeOffice 1 – Office 2

$1,900Office 2 – Office 3

$1,900Total Costs = $3,800

Cost savingScalabilityMobility Securityglobal networkingeffective bandwidth use.

Advantages

Understanding of security issues. Immature standards.Reliability and performance VPN is not

under an organization's direct control.

Disadvantages

• A virtual private network (VPN) uses the open, distributed infrastructure of the Internet to transmit data between corporate sites.

• Virtual private network offers cheap way to build WAN .

• The standardisation of VPN technology will lead to its wide spread use among network users.

Conclusion

• http://en.wikipedia.org/wiki/Virtual_private_network• http://www.buildinglinuxvpns.net/chapter2.pdf• http://technet.microsoft.com/en-us/library/

cc786563(WS.10).aspx• http://technet.microsoft.com/en-us/library

/bb742566.aspx

References