Downlaod File

Download Report

Transcript Downlaod File

Virtual Private Networks
Done By:
Noor Alhathal 200901002
Deena Jokhdar 200901528
Sara Alghamdi 200900137
Outline
Introduction
Definition of VPN’s
Functions of VPN’s
Types of VPN’s
Advantages and disadvantages of VPN’s
Security Mechanism used in VPN’s
Conclusion and recommendation
Summary
References
Introduction
• Uses public telecommunication channels, such as the Internet
or other network service, instead of leased lines channels.
• Described as Virtual because it is distant connection using
private connections.
• Used to widely now because of today's globalization.
• Connects users or branches.
• Used to use dial-up or Leased
communication, now using IP-VPN’s
Methodology
• We have conducted a library research
• Qualitative research
• information mainly based on secondary resources.
• gathered information from articles, books related to
Virtual Private Networks.
What is a VPN?
• Virtual private network is a communication it
is usually used in companies and
organizations. it scrambles the connections
between two computers so that only the
sender and intended recipient know what is
being sent. It is useful for customers who
exchange sensitive data.
Functions of VPN
• Extend geographic connectivity.
• Improve security
• Reduce transfer time and transportation costs for
remote users.
• Provide global networking opportunities.
• Provide home-worker support.
• Support remote access to an internet.
• Join networks between two organizations,
forming an extranet.
Types of VPN’s:
Access VPNs
• alternatives to ISDN and dial connections
• Asynchronous dials, ISDN, DSL, mobile IP, and the
cable technologies are also supported.
• access connections offer much lower cost solution,
as well as a wide range of connectivity options.
Security
• identifying the user as a member of the approved
consumer company,
• and then setting up a private tunnel to its gateway,
• which holds the per-user authentication and
authorization.
Intranet connections
• link business headquarters, remote and branch
offices over shared communication
• alternative to leased line communication
• Intranet connections also provide the advantage of
lower cost and extended connectivity to users
Connection
• Remote employees or mobile users will
connect to a limited Point of Presence, or POP,
to the Service Provider and access their
company’s network.
Extranet VPNs
• link consumers, suppliers or partners of a corporate
intranet through a joint communications using
dedicated connections.
• as alternative to EDI of fax and has replaced old
communication channels
• widely used in today’s world as the extranet assist
the process of e-commerce communication and
made it way much easier and faster.
The Advantages of the Virtual Private
Network:
– Greater scalability
– Easy to add/remove users
– Reduced long-distance telecommunications
costs
– Mobility
– Security
The Disadvantages of the
Virtual Private Network:
– Lack of standards
– Understanding of security issues
– Unpredictable Internet traffic
– Difficult to accommodate products from
different vendors
The security mechanism
used in VPNs:
For secure VPNs, the technologies that VPNC supports are:
• IPsec with encryption
• L2TP inside of IPsec
• SSL with encryption
For trusted VPNs, the technologies that VPNC supports are:
• MPLS with constrained distribution of routing information
through BGP ("layer 3 VPNs")
• Transport of layer 2 frames over MPLS ("layer 2 VPNs")
Conclusion
In conclusion the VPNs let the users or companies to connect to
remote servers over the public internet network, while
maintaining protected telecommunications. The VPNs
technology is designed to address concerns of the existing
business trend toward improved telecommuting and broadly
distributed international operations, where employees must be
able to attach to central resources and communicate with each
other.
Recommendations
VPN can have some limitations such :
• as the clients hit the network stack
• or may not play well with personal firewalls or other software
or even may not need full access to the target network just
encrypted access.
So we recommend:
• VPN users to use SSL as the main transport protocol to an
appliance.
• Users can add NT authentication to the appliance. Or,
Clientless mode: Use web enabled applications over the
Internet, the appliance SSLifies web sites.
Summary
Definition of VPN’s
Functions of VPN’s
Types of VPN’s
Advantages and disadvantages of VPN’s
Security Mechanism used in VPN’s
References
• jeff , T. (2009). How virtual private networks work. Retrieved from
http://www.communicat.com.au/downloads/factsheets/how_vpn_work.p
df
• james, F. (2000). Multi-access virtual private network.6061796 (May 9,
2000), Retrieved from http://www.google.com/scholar
• What is VPN (virtual private networking)?. (2008, 8 12). Retrieved from
http://kb.netgear.com/app/answers/detail/a_id/1128/~/what-is-vpn(virtual-private-networking) mitchell, B. (n.d.). Vpn - virtual private
network. Retrieved from
Thank you
any questions!