Virtual Private Networks - PowerPoint PPT Presentation

About This Presentation
Title:

Virtual Private Networks

Description:

Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network that encompasses ... – PowerPoint PPT presentation

Number of Views:143
Avg rating:3.0/5.0
Slides: 8
Provided by: templ47
Learn more at: http://www.cs.sjsu.edu
Category:

less

Transcript and Presenter's Notes

Title: Virtual Private Networks


1
Virtual Private Networks
  • Shamod Lacoul
  • CS265

2
What is a Virtual Private Network (VPN)?
  • A Virtual Private Network is an extension of a
    private network that encompasses links across
    shared or public networks like the Internet VPN
    in Windows 2000 Overview by Microsoft.
  • An encrypted or encapsulated communication
    process that transfers data from one point to
    another point securely the security of that data
    is assured by robust encryption technology, and
    the data that flows passes through an open,
    unsecured, routed network. Brown Steven,
    Implementing Virtual Private Networks.

3
Types of VPN
  • Trusted VPN
  • Secure VPN
  • Hybrid VPN
  • Provider-Provisioned VPN

4
Security Risks of the VPN
  • Basic Firewalls
  • the sole use of firewalls does do no good to
    protect connections in a public area.
  • Network Attacks
  • denial of service attacks, address spoofing,
    session hijacking, man-in-the-middle attack,
    replay attack, and detection and clean up.
  • Cryptographic Assaults
  • Cipher text only attack, known plaintext attack,
    chosen plaintext attack, chosen cipher-text
    attack, brute force attack, password guessers and
    dictionary attacks and social engineering.

5
Technologies in VPN
  • Firewalls
  • filter packets by examining IP addresses or ports
    requested on ingress or egress traffic.
  • Encryption
  • maintains the security of data in transit to be
    private in a public space.
  • Authentication
  • to finalize that the user trying to gain access
    to a private network is for real.
  • Tunneling
  • Point-to-Point Tunneling Protocol (PPTP)
  • Layer 2 Tunneling Protocol (L2TP)
  • IPSec Tunnel Mode

6
VPN Tunneling
  • Point-To-Point Tunneling Protocol
  • Layer 2 Tunneling Protocol
  • IPSec Tunnel Mode

7
VPN Reads
  • Virtual Private Networks, 2nd Edition Oreilly
    Publishers
  • Implementing Virtual Private Networks, Brown
    Steven
  • http//www.microsoft.com/windows2000/docs/VPNoverv
    iew.doc
  • http//www.vpnc.org
Write a Comment
User Comments (0)
About PowerShow.com