Download Virtual Private Network

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Authentication wikipedia , lookup

Computer security wikipedia , lookup

Mobile security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Unix security wikipedia , lookup

Secure multi-party computation wikipedia , lookup

Distributed firewall wikipedia , lookup

Wireless security wikipedia , lookup

3-D Secure wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Virtual Private Network
Wo Yan Lam
Overview
• What is Virtual Private Network
• Different types of VPN
– Remote-Access VPN
– Site-to-site VPN
• Security features of VPN
• Advantages of using VPN
What is Virtual Private Network
• a VPN is a private network that uses a
public network (usually the Internet) to
connect remote sites or users together.
Instead of using a dedicated, real-world
connection such as leased line, a VPN
uses "virtual" connections routed through
the Internet from the private network to the
remote users
Different types of VPN
• Remote-Access VPN
• Site-to-Site VPN
Remote-Access VPN
• User-to-LAN connection
• Large remote-access VPN will outsource to an
enterprise service provider (ESP)
• ESP sets up a network access server (NAS) and
provides the remote users with desktop client
software for their computers. The telecommuters
can then dial a toll-free number to reach the
NAS and use their VPN client software to access
the corporate network
Remote-Access VPN
• Remote-access VPNs permit secure,
encrypted connections between a
company's private network and remote
users through a third-party service
provider
Site-to-Site VPN
• Use of dedicated equipment and largescale encryption
• Connect multiple fixed sites over a public
network
• 2 types of site-to-site VPN
– Intranet-based
– Extranet-based
Intranet-based
• Usually for corporations who have one or
more remote locations
• Creates an intranet VPN to connect LAN
to LAN
Extranet-based
• Usually between 2 different corporations
• They can build an extranet VPN that
connects LAN to LAN, and that allows all
of the various companies to work in a
shared environment
Security Features of VPN
• Internet Protocol Security Protocol
(IPSec)
• Authentication, Authorization and
Accounting Servers
(AAA Servers)
Internet Protocol Security Protocol
(IPSec)
• IP Tunnel
– An encapsulation of one IP packet inside of
another, for the purpose of simulating a
physical connection between two remote
networks across an intermediate network
Other secure VPN protocols
•
•
•
•
Secure Sockets Layer (SSL)
Point-to-point tunneling protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Layer 2 Tunneling Protocol Version 3
(L2TPv3)
• VPN-Q
Authentication, Authorization and
Accounting Servers (AAA Servers)
• Used for more secure access in a remoteaccess VPN environment
• The server will check:
– Who you are (authentication)
– What you are allowed to do (authorization)
– What you actually do (accounting)
Advantages
• Extend geographic connectivity
• Improve security
• Reduce operational costs versus
traditional WAN
• Reduce transit time and transportation
costs for remote users
Advantages
• Improve productivity
• Simplify network topology
• Provide global networking opportunities
References
• http://computer.howstuffworks.com
• Wikipedia.org