Virtual Private Network
Download
Report
Transcript Virtual Private Network
Virtual Private Network
Susan Mulholland
Joseph Paulowskey
Joseph Wolfe
What is a VPN?
to connect multiple private networks
securely across an unsecured public
network like the Internet.
The connection between the networks
will be secure
The private networks have no idea that
they are transmitting data over a public
network.
Virtual Private Network
University of
Scranton
network
Mobile wireless
laptop
What makes VPNs so useful?
VPNs became necessary because companies
were expanding geographically
The need for secure communication is very
important to the companies, which VPN offers
Prior to VPN, companies would lease lines to
keep their business connected
•
•
Very Expensive
Cost Increased as the distance increased
Good Features about VPNs
Easy to merge networks together
Greater Geographical Boundaries
Cost Efficient
Access to companies network away from
office
Improve security
Reduce transit time & transportation
costs for remote users.
Improve productivity
3 Types of Virtual Private
Network
Internet VPN
Extranet VPN
Remote Access VPN
3 Types of Virtual Private Network
Intranet VPN
- Low cost, tunneled
connections w/ VPN
services as IPSec
encryption.
- Cost savings
VPN
Extranet VPN
- Extends WANs
w/ business
partners
- Safe security
Remote Access VPN
-Secure, scalable, &
tunneled networks
across a public network
- Cost savings
Types of VPNs
Encrypted VPN
Non-Encrypted VPN
Encrypted VPN
Secures Traffic being sent across an
unsecured network by using different
types of encryption
Secure VPN Protocols
• IPSec – IP Security (Most Used)
• SSL – Secure Socket Layer
• Used for tunneling the entire network stack
• PPTP – Point-to-Point Tunneling Protocol
VPN Security - IPSec
Has two encryption modes:
- tunnel
* Encrypts header &
payload of each packet
while transport encrypts
payload.
* IPSec compliant for
systems only take
advantage of this tunnel
protocol. Also can encrypt
data between router to
router, firewall to router, PC
to router, and PC to server.
- transport
* provides transparent
transfer of data between
end systems using the
services of the network
layer (e.g. IP) below to
move PDUs of data
between the two
communicating systems
Remote Access VPN utilizing IPSec
Cisco Systems, Inc.
Tunneling
Transmission of data intended for use
only within a private network
Encapsulate data from a private network
so it looks like the information appears to
be public data
Tunneling : Point-to-Point Tunneling Protocol
Was created by the PPTP
Forum, a consortium (US
Robotics and etc).
Supports 40-bit and 128-bit
encryption.
Uses any authentication
scheme supported by PPP.
Remote Site
`
`
HUB
Router
Internet
`
Router
HUB
`
`
`
Home Office
Non-Encrypted VPN
Data is not secured at all or it is being
secured by other means of security
besides data encryption
Types of Non-Encrypted VPNs
Multi Protocol Label Switching VPNs
•
Uses Route Segmentation across the virtual
connection
• Secures the traffic between only the two private
networks
Generic Routing Encapsulation
•
•
Tunnel used to hide a global network from the private
end points
IPSec in tunnel mode is sometimes used as the
encapsulating protocol
Four Types of VPN Secure
Dialog
Authentication
Presentation
Transportation
Correct Message Reception
Authentication
Make sure that the user is who it says it
is
Ways of checking this maybe for
example:
• Login/Password
• Token/Card Key
• Fingerprint/Retinal Scan
Other Three Types
Presentation
Transportation
• Encryption
• Data Integrity – data has not been tampered
with
Correct Message Reception
• Message has been sent and receiveed by
specified parties
• Used in online sales such as digital music
VPNs Security
Security is one of the main reasons why
VPNs are so widely used
To ensure security VPNs are placed inbetween networks and are using
encrypted VPN tunneling.
Security Problems
Security on Client side must be strictly
enforced
Scale of access to network must be
limited
Resources
http://www.computernetworkinghelp.com
/content/view/37/2/
http://en.wikipedia.org/wiki/VPN