Title: VIRTUAL PRIVATE NETWORKS (VPN)
1VIRTUAL PRIVATE NETWORKS (VPN)
2WAN Technology Comparison
3WAN technology - PSTN
4WAN technology X.25 and Frame Relay
5WAN technology - ISDN
6WAN technology T-Carrier
7DSL Connectivity
8WAN technology - SONET
9What is VPN?
- Virtual Private Network is a type of private
network that uses public telecommunication, such
as the Internet, instead of leased lines to
communicate. - Became popular as more employees worked in remote
locations.
10Remote Access Virtual Private Network
(From Gartner Consulting)
11VPN Types
- Secure VPNs use cryptographic tunneling
protocols. - IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3,
VPN-Q and MPVPN - Trusted VPNs rely on the security of a single
providers network to protect the traffic. - MPLS and L2F
12Tunneling
- A virtual point-to-point connection
- made through a public network. It transports
- encapsulated datagrams.
Original Datagram
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Data Encapsulation From Comer
- Two types of end points
- Remote Access
- Site-to-Site
13Tunneling
14VPN Tunneling
Figure 1
15Tunneling Technology
16PPTP Tunnel
17Cryptographic Tunneling Factor
- Authentication validates that the data was sent
from the sender. - Access control limiting unauthorized users from
accessing the network. - Confidentiality preventing the data to be read
or copied as the data is being transported. - Data Integrity ensuring that the data has not
been altered - Cryptography Technic
- Encryption -- is a method of scrambling data
before transmitting it onto the Internet. - Public Key Encryption Technique
- Digital signature for authentication
18Virtual Private Networks
- VPN can be deployed in three ways
- Host to host
- Site-to-Site
- Host-to-Site
19Possible Configurations of VPN
20VPN Topology Types of VPNs
- Remote access VPN
- Intranet VPN
- Extranet VPN
21VPN Topology Remote Access VPN
22VPN Topology Intranet VPN
23VPN Topology Extranet VPN
24Digital Signature to verify data not changed in
transit
25PKI the full picture
26WebVPN
27WebVPN Features
28WebVPN and IPSec Comparison
29Intro to MPLS
- MPLS Multi Protocol Label Switching
- Suatu metode forwarding (meneruskan data/paket
melalui suatu jaringan dengan menggunakan
informasi label yang dilekatkan pada I - Memungkinkan router meneruskan paket dengan hanya
melihat label yang melekat pada paket tersebut,
sehinggap tidak perlu lagi melihat alamat IP
tujuan)
30Back
312. ARSITEKTUR MPLS
- Perpaduan mekanisme Label Swapping (Layer 2) dan
Routing (Layer 3) - Terdiri atas LSR yang saling terhubung, membentuk
suatu LSP - LSR pertama disebut ingress
- LSR terakhir disebut egress
- Bagian tepi dari jaringan LSR disebut LER
Back
32- LSR Label Switched Router
- LSP Label Switched Path
- LER Label Edge Router
- TTL Time to Live
Back
335. OPERASI MPLS
- Pembuatan label dan distribusi
- Pembuatan label dalam tiap router
- Pembuatan jalur label yang terhubung
- Pemasukan label
- Forwarding paket
Back