Download Virtual Private Network

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Internet protocol suite wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Net bias wikipedia , lookup

Peering wikipedia , lookup

Zero-configuration networking wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer security wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Wireless security wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Peer-to-peer wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Virtual Private Network
Susan Mulholland
Joseph Paulowskey
Joseph Wolfe
What is a VPN?



to connect multiple private networks
securely across an unsecured public
network like the Internet.
The connection between the networks
will be secure
The private networks have no idea that
they are transmitting data over a public
network.
Virtual Private Network
University of
Scranton
network
Mobile wireless
laptop
What makes VPNs so useful?



VPNs became necessary because companies
were expanding geographically
The need for secure communication is very
important to the companies, which VPN offers
Prior to VPN, companies would lease lines to
keep their business connected
•
•
Very Expensive
Cost Increased as the distance increased
Good Features about VPNs







Easy to merge networks together
Greater Geographical Boundaries
Cost Efficient
Access to companies network away from
office
Improve security
Reduce transit time & transportation
costs for remote users.
Improve productivity
3 Types of Virtual Private
Network



Internet VPN
Extranet VPN
Remote Access VPN
3 Types of Virtual Private Network
Intranet VPN
- Low cost, tunneled
connections w/ VPN
services as IPSec
encryption.
- Cost savings
VPN
Extranet VPN
- Extends WANs
w/ business
partners
- Safe security
Remote Access VPN
-Secure, scalable, &
tunneled networks
across a public network
- Cost savings
Types of VPNs


Encrypted VPN
Non-Encrypted VPN
Encrypted VPN


Secures Traffic being sent across an
unsecured network by using different
types of encryption
Secure VPN Protocols
• IPSec – IP Security (Most Used)
• SSL – Secure Socket Layer
• Used for tunneling the entire network stack
• PPTP – Point-to-Point Tunneling Protocol
VPN Security - IPSec

Has two encryption modes:
- tunnel
* Encrypts header &
payload of each packet
while transport encrypts
payload.
* IPSec compliant for
systems only take
advantage of this tunnel
protocol. Also can encrypt
data between router to
router, firewall to router, PC
to router, and PC to server.
- transport
* provides transparent
transfer of data between
end systems using the
services of the network
layer (e.g. IP) below to
move PDUs of data
between the two
communicating systems
Remote Access VPN utilizing IPSec
Cisco Systems, Inc.
Tunneling


Transmission of data intended for use
only within a private network
Encapsulate data from a private network
so it looks like the information appears to
be public data
Tunneling : Point-to-Point Tunneling Protocol



Was created by the PPTP
Forum, a consortium (US
Robotics and etc).
Supports 40-bit and 128-bit
encryption.
Uses any authentication
scheme supported by PPP.
Remote Site
`
`
HUB
Router
Internet
`
Router
HUB
`
`
`
Home Office
Non-Encrypted VPN

Data is not secured at all or it is being
secured by other means of security
besides data encryption
Types of Non-Encrypted VPNs

Multi Protocol Label Switching VPNs
•
Uses Route Segmentation across the virtual
connection
• Secures the traffic between only the two private
networks

Generic Routing Encapsulation
•
•
Tunnel used to hide a global network from the private
end points
IPSec in tunnel mode is sometimes used as the
encapsulating protocol
Four Types of VPN Secure
Dialog




Authentication
Presentation
Transportation
Correct Message Reception
Authentication


Make sure that the user is who it says it
is
Ways of checking this maybe for
example:
• Login/Password
• Token/Card Key
• Fingerprint/Retinal Scan
Other Three Types

Presentation

Transportation
• Encryption
• Data Integrity – data has not been tampered
with

Correct Message Reception
• Message has been sent and receiveed by
specified parties
• Used in online sales such as digital music
VPNs Security


Security is one of the main reasons why
VPNs are so widely used
To ensure security VPNs are placed inbetween networks and are using
encrypted VPN tunneling.
Security Problems


Security on Client side must be strictly
enforced
Scale of access to network must be
limited
Resources


http://www.computernetworkinghelp.com
/content/view/37/2/
http://en.wikipedia.org/wiki/VPN