vpn: virtual private network presented by: gregg dowdy liz farricker whitney mayoras
TRANSCRIPT
![Page 1: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/1.jpg)
VPN: Virtual Private Network
Presented By:Gregg Dowdy
Liz Farricker
Whitney Mayoras
![Page 2: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/2.jpg)
Outline
Introductions What is it? Overview Security/Tunneling Advantages and Disadvantages Demonstration
![Page 3: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/3.jpg)
Introductions
Gregg BSG – Student Developer Unified Western Grocers – Retail Technology
Specialist Liz
BSG – Business Analyst ResNet – Network Technician COB CRC: Tier 2/3 Support Technician
Whitney BSG – Student Tester/Analyst
![Page 4: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/4.jpg)
VPN: What is it?
Virtual Private Network Remote network communication through
Internet Used by companies/organizations who want
to communicate confidentially Two parts:
Protected or “inside” network “Outside” network or segment (less trustworthy)
![Page 5: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/5.jpg)
VPN: Types
Secure VPNs use cryptographic tunneling protocols. IPsec, SSL/TLS, OpenVPN, PPTP, L2TP,
L2TPv3, VPN-Q and MPVPN Trusted VPNs rely on the security of a
single provider’s network to protect the traffic. MPLS and L2F
![Page 6: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/6.jpg)
VPN: Security
Encryption IPSec Authentication
User/System and Data AAA Servers
(Authentication, Authorization, and Accounting)
Firewalls
![Page 7: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/7.jpg)
VPN: Tunneling
Requires 3 protocols Carrier
Default network protocol Passenger
Original data Encapsulation
GRE, IPSec, L2F, PPTP, L2TP
![Page 8: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/8.jpg)
VPN: Encapsulation
Figure 1
![Page 9: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/9.jpg)
VPN: Tunneling (cont.)
Two Basic types of tunneling Site-to-Site
Typically uses GRE Remote-Access
Typically uses PPP
![Page 10: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/10.jpg)
VPN: Advantages
Cost Effective Greater scalability Easy to add/remove users Mobility Security
![Page 11: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/11.jpg)
VPN: Disadvantages
Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products
from different vendors
![Page 12: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/12.jpg)
VPN Demonstration
Click on Start – select Network Connections
![Page 13: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/13.jpg)
VPN Demonstration
In Network Connections on the left hand side there is a link to “Create New Connection” – click on this and a wizard will pop up assisting the user
![Page 14: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/14.jpg)
VPN Demonstration
Select “Connect to the Network at my Workplace”
![Page 15: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/15.jpg)
VPN Demonstration
Select “Virtual Private Network Connection”
![Page 16: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/16.jpg)
VPN Demonstration
Make a name for this connection that you are establishing – to distinguish this connection from other VPN connections that might already be established
![Page 17: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/17.jpg)
VPN Demonstration
For this demonstration I am trying to connect to my wireless router off campus therefore the IP address that I insert is the IP address for my router which I can find out by running an ipconfig and it is the IP address for your default gateway
NOTE: Not all routers will allow users to VPN into it
![Page 18: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/18.jpg)
VPN Demonstration
Personal preference as to whether or not you want other users to be able to use this VPN connection on this computer
![Page 19: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/19.jpg)
VPN Demonstration
![Page 20: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/20.jpg)
VPN Demonstration
![Page 21: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/21.jpg)
VPN Demonstration
This is a profile (username and password) that has already been created on your router – which can be created by typing in the IP address of your router in a web browser
![Page 22: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/22.jpg)
VPN Demonstration
![Page 23: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/23.jpg)
VPN Demonstration
In Start – Run insert the IP address of the computer that you want to access that is connected to the router
![Page 24: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/24.jpg)
VPN Demonstration
Using the same username and password already established for the router you can connect to this specific computer
![Page 25: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/25.jpg)
VPN Demonstration
These are only the files that are “shared” on this computer
![Page 26: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/26.jpg)
How to Connect to OSU:
How to connect to OSU: Dave Sullivan made a helpful Tutorial First on the Engineering Website you have to download
the Cisco VPN Client One must acquire authorization information prior to
using the VPN service Once registration is complete you download the
appropriate client depending on your operating system; and follow the steps to complete the connection
![Page 27: VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras](https://reader030.vdocument.in/reader030/viewer/2022032600/56649dc65503460f94ab9b02/html5/thumbnails/27.jpg)
References
[Figure 1] <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>
Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.
Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>.
"Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.