* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Virtual Private Network
Survey
Document related concepts
Internet protocol suite wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer security wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Wireless security wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
UniPro protocol stack wikipedia , lookup
Peer-to-peer wikipedia , lookup
Transcript
Virtual Private Network Susan Mulholland Joseph Paulowskey Joseph Wolfe What is a VPN? to connect multiple private networks securely across an unsecured public network like the Internet. The connection between the networks will be secure The private networks have no idea that they are transmitting data over a public network. Virtual Private Network University of Scranton network Mobile wireless laptop What makes VPNs so useful? VPNs became necessary because companies were expanding geographically The need for secure communication is very important to the companies, which VPN offers Prior to VPN, companies would lease lines to keep their business connected • • Very Expensive Cost Increased as the distance increased Good Features about VPNs Easy to merge networks together Greater Geographical Boundaries Cost Efficient Access to companies network away from office Improve security Reduce transit time & transportation costs for remote users. Improve productivity 3 Types of Virtual Private Network Internet VPN Extranet VPN Remote Access VPN 3 Types of Virtual Private Network Intranet VPN - Low cost, tunneled connections w/ VPN services as IPSec encryption. - Cost savings VPN Extranet VPN - Extends WANs w/ business partners - Safe security Remote Access VPN -Secure, scalable, & tunneled networks across a public network - Cost savings Types of VPNs Encrypted VPN Non-Encrypted VPN Encrypted VPN Secures Traffic being sent across an unsecured network by using different types of encryption Secure VPN Protocols • IPSec – IP Security (Most Used) • SSL – Secure Socket Layer • Used for tunneling the entire network stack • PPTP – Point-to-Point Tunneling Protocol VPN Security - IPSec Has two encryption modes: - tunnel * Encrypts header & payload of each packet while transport encrypts payload. * IPSec compliant for systems only take advantage of this tunnel protocol. Also can encrypt data between router to router, firewall to router, PC to router, and PC to server. - transport * provides transparent transfer of data between end systems using the services of the network layer (e.g. IP) below to move PDUs of data between the two communicating systems Remote Access VPN utilizing IPSec Cisco Systems, Inc. Tunneling Transmission of data intended for use only within a private network Encapsulate data from a private network so it looks like the information appears to be public data Tunneling : Point-to-Point Tunneling Protocol Was created by the PPTP Forum, a consortium (US Robotics and etc). Supports 40-bit and 128-bit encryption. Uses any authentication scheme supported by PPP. Remote Site ` ` HUB Router Internet ` Router HUB ` ` ` Home Office Non-Encrypted VPN Data is not secured at all or it is being secured by other means of security besides data encryption Types of Non-Encrypted VPNs Multi Protocol Label Switching VPNs • Uses Route Segmentation across the virtual connection • Secures the traffic between only the two private networks Generic Routing Encapsulation • • Tunnel used to hide a global network from the private end points IPSec in tunnel mode is sometimes used as the encapsulating protocol Four Types of VPN Secure Dialog Authentication Presentation Transportation Correct Message Reception Authentication Make sure that the user is who it says it is Ways of checking this maybe for example: • Login/Password • Token/Card Key • Fingerprint/Retinal Scan Other Three Types Presentation Transportation • Encryption • Data Integrity – data has not been tampered with Correct Message Reception • Message has been sent and receiveed by specified parties • Used in online sales such as digital music VPNs Security Security is one of the main reasons why VPNs are so widely used To ensure security VPNs are placed inbetween networks and are using encrypted VPN tunneling. Security Problems Security on Client side must be strictly enforced Scale of access to network must be limited Resources http://www.computernetworkinghelp.com /content/view/37/2/ http://en.wikipedia.org/wiki/VPN