Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Authentication wikipedia , lookup
Computer security wikipedia , lookup
Mobile security wikipedia , lookup
Security-focused operating system wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Unix security wikipedia , lookup
Secure multi-party computation wikipedia , lookup
Distributed firewall wikipedia , lookup
Wireless security wikipedia , lookup
Virtual Private Network Wo Yan Lam Overview • What is Virtual Private Network • Different types of VPN – Remote-Access VPN – Site-to-site VPN • Security features of VPN • Advantages of using VPN What is Virtual Private Network • a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the private network to the remote users Different types of VPN • Remote-Access VPN • Site-to-Site VPN Remote-Access VPN • User-to-LAN connection • Large remote-access VPN will outsource to an enterprise service provider (ESP) • ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network Remote-Access VPN • Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider Site-to-Site VPN • Use of dedicated equipment and largescale encryption • Connect multiple fixed sites over a public network • 2 types of site-to-site VPN – Intranet-based – Extranet-based Intranet-based • Usually for corporations who have one or more remote locations • Creates an intranet VPN to connect LAN to LAN Extranet-based • Usually between 2 different corporations • They can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment Security Features of VPN • Internet Protocol Security Protocol (IPSec) • Authentication, Authorization and Accounting Servers (AAA Servers) Internet Protocol Security Protocol (IPSec) • IP Tunnel – An encapsulation of one IP packet inside of another, for the purpose of simulating a physical connection between two remote networks across an intermediate network Other secure VPN protocols • • • • Secure Sockets Layer (SSL) Point-to-point tunneling protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Layer 2 Tunneling Protocol Version 3 (L2TPv3) • VPN-Q Authentication, Authorization and Accounting Servers (AAA Servers) • Used for more secure access in a remoteaccess VPN environment • The server will check: – Who you are (authentication) – What you are allowed to do (authorization) – What you actually do (accounting) Advantages • Extend geographic connectivity • Improve security • Reduce operational costs versus traditional WAN • Reduce transit time and transportation costs for remote users Advantages • Improve productivity • Simplify network topology • Provide global networking opportunities References • http://computer.howstuffworks.com • Wikipedia.org