VPN: Virtual Private Network: Sushant Parab Sumeet Mondal Jayesh Nair Poonam Marathe

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 31

VPN:

Virtual Private Network

Presented by
Sushant Parab
Sumeet Mondal
Jayesh Nair
Poonam Marathe
INTRODUCTION

What is a VPN?
Virtual Private Network
Virtual Private Network
 Three Major Categories:
• Trusted VPN
• Secure VPN
• Hybrid VPN
Trusted VPN
 Virtual Private Network for which the
topology and traffic flow is provisioned
and maintained by the service provider.
 Also known as provider provisioned
VPNs
 IETF working group – PPVPN
Secure VPN
 Virtual Private Networks that are
constructed using encryption and other
security mechanisms
 e.g. authentication, integrity checking
 Includes purchasing, configuring and
maintaining hardware and software.
Hybrid VPN
 Secure VPN used over trusted VPN
 Includes advantages of both Trusted and
Secure VPN technology .
 Supports technologies supported by both
trusted VPN as well as secure VPN.
VPN Requirements
 Existing hardware (Servers, workstations,…)
 Internet connection
 VPN - Router/Switch
 Software to create and manage tunnels
 Security Device such as firewall
VPN TOPOLOGY

How does a VPN work?


VPN Topology: Types of VPNs
 Remote access VPN
 Intranet VPN
 Extranet VPN
VPN Topology: Remote Access
VPN
VPN Topology: Intranet VPN
VPN Topology: Extranet VPN
VPN COMPONENTS

What are the components


of VPN?
VPN Components
 Protocols
 Security
 Appliances
VPN Components: Protocols

 IP Security (IPSec)
• Transport mode
• Tunnel mode
Transport mode
 Only the payload of the IP packet is
encrypted and/or authenticated.
 The routing is intact.
 Layers are always secured by hash.
 host-to-host communications.
 Example :private chat
Tunnel mode
 The entire IP packet is encrypted and/or
authenticated.
 It is then encapsulated into a new IP
packet with a new IP header.
 Tunnel mode is used to create Virtual
Private Networks for network-to-network
communications
 e.g. between routers to link sites
VPN Components: Protocols

 Point-to-Point Tunneling Protocol (PPTP)


• Voluntary tunneling method
• Uses PPP (Point-to-Point Protocol)
VPN Components: Protocols
 Layer 2 Tunneling Protocol (L2TP)
• Exists at the data link layer of OSI
• Composed from PPTP and L2F (Layer 2
Forwarding)
VPN Components: Security

 Encryption
• Technique for scrambling and unscrambling
information
• Unscramble – called clear-text
• Scrambled information – cipher-text
VPN Components: Security

 Keys
• Secret code that the encryption algorithm uses to
create a unique version of cipher-text
• 8-bits keys = 256 combinations or two to the eighth
power
• 16-bits keys = 65,536 combinations or two to the 16th
power
• 56-bits keys = 72,057,594,037,927,900 or two to the
56th power
• 168-bits keys …
VPN Components: Security
 Authentication
• Determine if the sender is the authorized
person and if the data has been redirect or
corrupted
• User/System Authentication
• Data Authentication
VPN Components: Appliances
 Intrusion detection firewalls
• Monitors traffic crossing network parameters
and protects enterprises from unauthorized
access
• Packet-level firewall checks source and
destination
• Application-level firewall acts as a host
computer between the organization’s network
and the Internet
VPN Topology: Advantages and
Disadvantages of VPN
 Advantages:
• Greater scalability
• Easy to add/remove users
• Reduced long-distance telecommunications
costs
• Mobility
• Security
VPN Topology: Advantages and
Disadvantages of VPN
 Disadvantages
• Lack of standards
• Understanding of security issues
• Unpredictable Internet traffic
• Difficult to accommodate products from
different vendors
Software implementations
 PPTP was the first VPN protocol that
was supported by Microsoft Dial-up
Networking
 Microsoft Windows Mobile 2003 and
higher also support the PPTP protocol.
 L2TP works in ADSL networks and cable
networks
Industries That May Use a VPN

 Healthcare: Transferring of confidential patient


information.
 Manufacturing: Allow suppliers to view inventory
& allow clients to purchase online safely.
 Retail: Secure transfer sales data or customer
information.
 Banking/Financial: Account information to be
transferred safely.
VPN Productivity and Cost
Benefits: Benefits
 Extends geographic connectivity
 Boosts employee productivity
 Improves Internet security
 Scales easily
VPN Productivity and Cost
Benefit: Costs
 Costs associated with implementing VPN
• In House implementation
• Outsourced implementation
• Middle Ground implementation
CONCLUSION

Virtual Private Network

You might also like