VPN: Virtual Private Network: Sushant Parab Sumeet Mondal Jayesh Nair Poonam Marathe
VPN: Virtual Private Network: Sushant Parab Sumeet Mondal Jayesh Nair Poonam Marathe
VPN: Virtual Private Network: Sushant Parab Sumeet Mondal Jayesh Nair Poonam Marathe
Presented by
Sushant Parab
Sumeet Mondal
Jayesh Nair
Poonam Marathe
INTRODUCTION
What is a VPN?
Virtual Private Network
Virtual Private Network
Three Major Categories:
• Trusted VPN
• Secure VPN
• Hybrid VPN
Trusted VPN
Virtual Private Network for which the
topology and traffic flow is provisioned
and maintained by the service provider.
Also known as provider provisioned
VPNs
IETF working group – PPVPN
Secure VPN
Virtual Private Networks that are
constructed using encryption and other
security mechanisms
e.g. authentication, integrity checking
Includes purchasing, configuring and
maintaining hardware and software.
Hybrid VPN
Secure VPN used over trusted VPN
Includes advantages of both Trusted and
Secure VPN technology .
Supports technologies supported by both
trusted VPN as well as secure VPN.
VPN Requirements
Existing hardware (Servers, workstations,…)
Internet connection
VPN - Router/Switch
Software to create and manage tunnels
Security Device such as firewall
VPN TOPOLOGY
IP Security (IPSec)
• Transport mode
• Tunnel mode
Transport mode
Only the payload of the IP packet is
encrypted and/or authenticated.
The routing is intact.
Layers are always secured by hash.
host-to-host communications.
Example :private chat
Tunnel mode
The entire IP packet is encrypted and/or
authenticated.
It is then encapsulated into a new IP
packet with a new IP header.
Tunnel mode is used to create Virtual
Private Networks for network-to-network
communications
e.g. between routers to link sites
VPN Components: Protocols
Encryption
• Technique for scrambling and unscrambling
information
• Unscramble – called clear-text
• Scrambled information – cipher-text
VPN Components: Security
Keys
• Secret code that the encryption algorithm uses to
create a unique version of cipher-text
• 8-bits keys = 256 combinations or two to the eighth
power
• 16-bits keys = 65,536 combinations or two to the 16th
power
• 56-bits keys = 72,057,594,037,927,900 or two to the
56th power
• 168-bits keys …
VPN Components: Security
Authentication
• Determine if the sender is the authorized
person and if the data has been redirect or
corrupted
• User/System Authentication
• Data Authentication
VPN Components: Appliances
Intrusion detection firewalls
• Monitors traffic crossing network parameters
and protects enterprises from unauthorized
access
• Packet-level firewall checks source and
destination
• Application-level firewall acts as a host
computer between the organization’s network
and the Internet
VPN Topology: Advantages and
Disadvantages of VPN
Advantages:
• Greater scalability
• Easy to add/remove users
• Reduced long-distance telecommunications
costs
• Mobility
• Security
VPN Topology: Advantages and
Disadvantages of VPN
Disadvantages
• Lack of standards
• Understanding of security issues
• Unpredictable Internet traffic
• Difficult to accommodate products from
different vendors
Software implementations
PPTP was the first VPN protocol that
was supported by Microsoft Dial-up
Networking
Microsoft Windows Mobile 2003 and
higher also support the PPTP protocol.
L2TP works in ADSL networks and cable
networks
Industries That May Use a VPN