Virtual Private Network - PowerPoint PPT Presentation

About This Presentation
Title:

Virtual Private Network

Description:

Types of Non-Encrypted VPNs. Multi Protocol Label Switching VPNs ... Fingerprint/Retinal Scan. Other Three Types. Presentation. Encryption. Transportation ... – PowerPoint PPT presentation

Number of Views:64
Avg rating:3.0/5.0
Slides: 21
Provided by: josephppa
Category:

less

Transcript and Presenter's Notes

Title: Virtual Private Network


1
Virtual Private Network
Susan Mulholland Joseph Paulowskey Joseph Wolfe
2
What is a VPN?
  • to connect multiple private networks securely
    across an unsecured public network like the
    Internet.
  • The connection between the networks will be
    secure
  • The private networks have no idea that they are
    transmitting data over a public network.

3
Virtual Private Network
University of Scranton network
Mobile wireless laptop
4
What makes VPNs so useful?
  • VPNs became necessary because companies were
    expanding geographically
  • The need for secure communication is very
    important to the companies, which VPN offers
  • Prior to VPN, companies would lease lines to keep
    their business connected
  • Very Expensive
  • Cost Increased as the distance increased

5
Good Features about VPNs
  • Easy to merge networks together
  • Greater Geographical Boundaries
  • Cost Efficient
  • Access to companies network away from office
  • Improve security
  • Reduce transit time transportation costs for
    remote users.
  • Improve productivity

6
3 Types of Virtual Private Network
  • Internet VPN
  • Extranet VPN
  • Remote Access VPN

7
3 Types of Virtual Private Network
Intranet VPN - Low cost, tunneled connections w/
VPN services as IPSec encryption. - Cost savings
VPN
  • Extranet VPN
  • Extends WANs w/ business partners
  • Safe security
  • Remote Access VPN
  • Secure, scalable, tunneled networks across a
    public network
  • Cost savings

8
Types of VPNs
  • Encrypted VPN
  • Non-Encrypted VPN

9
Encrypted VPN
  • Secures Traffic being sent across an unsecured
    network by using different types of encryption
  • Secure VPN Protocols
  • IPSec IP Security (Most Used)
  • SSL Secure Socket Layer
  • Used for tunneling the entire network stack
  • PPTP Point-to-Point Tunneling Protocol

10
VPN Security - IPSec
  • Has two encryption modes
  • - tunnel
  • Encrypts header payload of each
    packet while transport encrypts payload.
  • IPSec compliant for systems only take
    advantage of this tunnel protocol. Also can
    encrypt data between router to router, firewall
    to router, PC to router, and PC to server.
  • - transport
  • provides transparent transfer of data between
    end systems using the services of the network
    layer (e.g. IP) below to move PDUs of data
    between the two communicating systems

Remote Access VPN utilizing IPSec Cisco
Systems, Inc.
11
Tunneling
  • Transmission of data intended for use only within
    a private network
  • Encapsulate data from a private network so it
    looks like the information appears to be public
    data

12
Tunneling Point-to-Point Tunneling Protocol
  • Was created by the PPTP Forum, a consortium (US
    Robotics and etc).
  • Supports 40-bit and 128-bit encryption.
  • Uses any authentication scheme supported by PPP.

13
Non-Encrypted VPN
  • Data is not secured at all or it is being secured
    by other means of security besides data
    encryption

14
Types of Non-Encrypted VPNs
  • Multi Protocol Label Switching VPNs
  • Uses Route Segmentation across the virtual
    connection
  • Secures the traffic between only the two private
    networks
  • Generic Routing Encapsulation
  • Tunnel used to hide a global network from the
    private end points
  • IPSec in tunnel mode is sometimes used as the
    encapsulating protocol

15
Four Types of VPN Secure Dialog
  • Authentication
  • Presentation
  • Transportation
  • Correct Message Reception

16
Authentication
  • Make sure that the user is who it says it is
  • Ways of checking this maybe for example
  • Login/Password
  • Token/Card Key
  • Fingerprint/Retinal Scan

17
Other Three Types
  • Presentation
  • Encryption
  • Transportation
  • Data Integrity data has not been tampered with
  • Correct Message Reception
  • Message has been sent and receiveed by specified
    parties
  • Used in online sales such as digital music

18
VPNs Security
  • Security is one of the main reasons why VPNs are
    so widely used
  • To ensure security VPNs are placed in-between
    networks and are using encrypted VPN tunneling.

19
Security Problems
  • Security on Client side must be strictly enforced
  • Scale of access to network must be limited

20
Resources
  • http//www.computernetworkinghelp.com/content/view
    /37/2/
  • http//en.wikipedia.org/wiki/VPN
Write a Comment
User Comments (0)
About PowerShow.com