Virtual Private Network (VPN) : BY: Sahil Sikka (0321152707) Rohit Thapliyal (0531152707)
Virtual Private Network (VPN) : BY: Sahil Sikka (0321152707) Rohit Thapliyal (0531152707)
Virtual Private Network (VPN) : BY: Sahil Sikka (0321152707) Rohit Thapliyal (0531152707)
NETWORK (VPN)
BY:
Sahil Sikka(0321152707)
Rohit Thapliyal(0531152707)
Traditional Connectivity
What is VPN?
Virtual
Private Network is a type of private
network that uses public
telecommunication, such as the Internet,
instead of leased lines to communicate.
Gives
users a secure link to access
corporate network over the Internet
Private Networks
vs.
Virtual Private Networks
Secured networks.
Saves
cost tremendously from reduction of
equipment and maintenance costs.
Scalability
Remote Access Virtual Private
Network
Brief Overview of How it Works
Two connections – one is made to the
Internet and the second is made to the VPN.
Datagrams – contains data, destination and
source information.
Firewalls – VPNs allow authorized users to
pass through the firewalls.
Protocols – protocols create the VPN tunnels
Four Critical Functions
Authentication – validates that the data was sent
from the sender.
Access control – limiting unauthorized users
from accessing the network.
Confidentiality – preventing the data to be read
or copied as the data is being transported.
Data Integrity – ensuring that the data has not
been altered
Encryption
Encryption-- is a method of “scrambling”
data before transmitting it onto the Internet.
To Internet
VPN connection
NIC Gateway
VPN gateway
Firewall
Database
AAA
Server File Server
Server
Components of IPSEC VPN
1. Client Authentication Certificate : Digital
Certificate from NIC Enterprise CA
2. VPN account : Provided by VPN Administrator
3. VPN Client Software : Can be uploaded from
ftp.ren.nic.in/vpn or downloads.nic.in . It can
also be downloaded from www.cisco.com
VPN Components
Protocols
Security
Appliances
VPN Components: Protocols
IP Security (IPSec)
◦ Transport mode
◦ Tunnel mode
Point-to-Point Tunneling Protocol (PPTP)
◦ Voluntary tunneling method
◦ Uses PPP (Point-to-Point Protocol)
VPN Components: Protocols
Layer 2 Tunneling Protocol (L2TP)
◦ Exists at the data link layer of OSI
◦ Composed from PPTP and L2F (Layer 2 Forwarding)
◦ Compulsory tunneling method
VPN Components: Security
Encryption
◦ Technique for scrambling and unscrambling
information
◦ Unscramble – called clear-text
◦ Scrambled information – cipher-text
Authentication
◦ Determine if the sender is the authorized person
and if the data has been redirect or corrupted
◦ User/System Authentication
◦ Data Authentication
VPN Components: Appliances
Intrusion detection firewalls
◦ Monitors traffic crossing network parameters and
protects enterprises from unauthorized access
◦ Packet-level firewall checks source and destination
◦ Application-level firewall acts as a host computer
between the organization’s network and the
Internet
VPN Topology: What is needed?
people.
VPN allows mobile workers &
service providers
Operational costs
Advantages: Scalability and security
Flexibility of growth
security
Disadvantages
VPNs require an in-depth understanding of
public network security issues and proper
deployment of precautions
Availability and performance depends on
factors largely outside of their control
Immature standards
VPNs need to accommodate protocols other
than IP and existing internal network
technology
Industries That May Use a VPN
Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care provider