* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Virtual Private Network (VPN)
Survey
Document related concepts
Computer security wikipedia , lookup
Airborne Networking wikipedia , lookup
Network tap wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Wireless security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Transcript
Virtual Private Network (VPN) Jeffery Jones James Santana BA479 March 15,2006 Introduction What is a VPN How a VPN works Hardware for Establishing a VPN Setting up a VPN Types of VPN Why have a VPN connection Securing the client Questions What is a VPN Private network Created to address two problems 1. High Cost 2. Securely connecting How a VPN Works 1. 2. VPN uses a special protocol Tunneling Exchanges Data Data safely wrapped and unwrapped Two types of encryption systems Symmetric key encryption Public key encryption These two types of encryption will be discussed more in depth in BA483 Hardware for VPN Desktop software client for each remote user Dedicated VPN server for dial-up services NAS (network access server) VPN network policy-management center Setting up a VPN Some of the factors that should be considered in designing a VPN are: Security Reliability Scalability Network management Policy management Setting up a VPN (continued) You can set up a VPN two ways: 1. 2. Between networks and firewalls or encrypting routers to do the encrypting and decrypting of the traffic. Have a firewall, encrypting router, or VPN server at the destination end and special VPN client software on the desktop or laptop computers. Reasons to have a VPN Its fast Its easy to take with you wherever you go Its able to maintain security and keep you hidden from others (mainly hackers) Its dependable Types of VPN There are three types of VPN Remote-access Site to site intranet Site to site extranet Securing the Client Breaking VPN Security Laptop Owners Precautions: Personal firewall Enable BIOS password OSU VPN Setup Too Bad…. Questions Times? Up!!!! References: http://computer.howstuffworks.com/vpn.htm http://www.vpnc.org/vpn-technologies.html http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/vpn.htm http://www.microsoft.com/technet/prodtechnol/windows2000serv/pl an/vpnoverview.mspx http://en.wikipedia.org/wiki/Virtual_private_network