CLICK HERE TO DOWNLOAD PPT ON VPN
VPN Presentation Transcript
1.VPN
2.Introduction: What is a VPN?
A VPN is A network that uses Internet or other network service to transmit data.
A VPN includes authentication and encryption to protect data integrity and confidentiality
A VPN is A network that uses Internet or other network service to transmit data.
A VPN includes authentication and encryption to protect data integrity and confidentiality
3.Introduction (continued):
4.Advantages of VPN
Advantages:
Greater scalability
Easy to add/remove users
Reduced long-distance telecommunications costs
Mobility
Security
Advantages:
Greater scalability
Easy to add/remove users
Reduced long-distance telecommunications costs
Mobility
Security
5.Disadvantages of VPN
Disadvantages
Lack of standards
Understanding of security issues
Unpredictable Internet traffic
Difficult to accommodate products from different vendors
6.VPN Components
Protocols
Security
Appliances
Disadvantages
Lack of standards
Understanding of security issues
Unpredictable Internet traffic
Difficult to accommodate products from different vendors
6.VPN Components
Protocols
Security
Appliances
7.VPN Components: Protocols
IP Security (IPSec)
Transport mode
Tunnel mode
Point-to-Point Tunneling Protocol (PPTP)
Voluntary tunneling method
Uses PPP (Point-to-Point Protocol)
IP Security (IPSec)
Transport mode
Tunnel mode
Point-to-Point Tunneling Protocol (PPTP)
Voluntary tunneling method
Uses PPP (Point-to-Point Protocol)
8.VPN Components: Protocols
Layer 2 Tunneling Protocol (L2TP)
Exists at the data link layer of OSI
Composed from PPTP and L2F (Layer 2 Forwarding)
Compulsory tunneling method
Layer 2 Tunneling Protocol (L2TP)
Exists at the data link layer of OSI
Composed from PPTP and L2F (Layer 2 Forwarding)
Compulsory tunneling method
9.Example of packet encapsulation
10.VPN Components: Security
Encryption
Technique for scrambling and unscrambling information
Unscramble – called clear-text
Scrambled information – cipher-text
11.VPN Components: Security
Keys
Secret code that the encryption algorithm uses to create a unique version of cipher-text
8-bits keys = 256 combinations or two to the eighth power
16-bits keys = 65,536 combinations or two to the 16th power
56-bits keys = 72,057,594,037,927,900 or two to the 56th power
168-bits keys …
Encryption
Technique for scrambling and unscrambling information
Unscramble – called clear-text
Scrambled information – cipher-text
11.VPN Components: Security
Keys
Secret code that the encryption algorithm uses to create a unique version of cipher-text
8-bits keys = 256 combinations or two to the eighth power
16-bits keys = 65,536 combinations or two to the 16th power
56-bits keys = 72,057,594,037,927,900 or two to the 56th power
168-bits keys …
12.VPN Components: Security
Authentication
Determine if the sender is the authorized person and if the data has been redirect or corrupted
User/System Authentication
Data Authentication
13.VPN Components: Appliances
Intrusion detection firewalls
Monitors traffic crossing network parameters and protects enterprises from unauthorized access
Packet-level firewall checks source and destination
Application-level firewall acts as a host computer between the organization’s network and the Internet
Authentication
Determine if the sender is the authorized person and if the data has been redirect or corrupted
User/System Authentication
Data Authentication
13.VPN Components: Appliances
Intrusion detection firewalls
Monitors traffic crossing network parameters and protects enterprises from unauthorized access
Packet-level firewall checks source and destination
Application-level firewall acts as a host computer between the organization’s network and the Internet
14.Encryption
Used to convert data to a secret code for transmission over an trusted network
15.Symmetric Encryption
Same key used to encrypt and decrypt message
Used by IPSec to encrypt actual message data
Examples: DES, 3DES, RC5
Used to convert data to a secret code for transmission over an trusted network
15.Symmetric Encryption
Same key used to encrypt and decrypt message
Used by IPSec to encrypt actual message data
Examples: DES, 3DES, RC5
16.Asymmetric Encryption
Different keys used to encrypt and decrypt message
Provides non-repudiation of message or message integrity
Examples include RSA, DSA
Different keys used to encrypt and decrypt message
Provides non-repudiation of message or message integrity
Examples include RSA, DSA
17.VPN Productivity and Cost Benefits: Benefits
Extends geographic connectivity
Boosts employee productivity
Improves Internet security
Scales easily
Extends geographic connectivity
Boosts employee productivity
Improves Internet security
Scales easily
18.VPN Productivity and Cost Benefit: Costs
Costs associated with implementing VPN
In House implementation
Outsourced implementation
Middle Ground implementation
Costs associated with implementing VPN
In House implementation
Outsourced implementation
Middle Ground implementation
19.Future of VPN
VPN popularity
Companies choosing VPN
Cost efficient?
New way of communicating?
VPN popularity
Companies choosing VPN
Cost efficient?
New way of communicating?
20.Future of VPN: Companies with VPN
21.Top 5 Tool used for VPN
22.Top 5 Tool used for VPN (con’td)
23.Top 5 Tool used for VPN (con’td)
24. Shrew Soft( Free)
25.Windows Built-In VPN( Free)
0 comments