Professional Documents
Culture Documents
Seminar On Virtual Private Network: Prepared by
Seminar On Virtual Private Network: Prepared by
PREPARED BY:
Definition and introductory notes VPN is the network which uses open distributed infrastructure of the internet to transmit data between corporate sites.
WORKING OF VPN
STEP1 STEP2 STEP3 STEP4
WORKING-STEP1 (cont)
The remote user dials into their local ISP and logs into the ISPs network as usual.
BACK
WORKING-STEP2 (cont)
When connectivity to the corporate network is desired, the user initiates a tunnel request to the destination Security server
BACK
The user then sends data through the tunnel which encrypted by the VPN software before being sent over the ISP connection
WORKING-STEP3 (cont)
BACK
WORKING-STEP4 (cont)
The destination Security server receives the encrypted data and decrypts.
TYPES OF VPN
VLL-Virtual leased lines. VPRN-virtual private routed network. VPDN-virtual private dial-up network. VPLS-virtual private LAN segments. Intranet VPN. Extranet VPN. Remote access VPN.
Point to point link between two CPE IP tunnel between 2 ISP edge routers. Frames are relayed between IP tunnels.
Emulation of multisite WAN using internet. Packet forwarding at network layer. VPRN specific forwarding table at ISP routers that forwards the traffic.
COMPULSORY TUNNEL
In this scenario L2TP Access Contractor (LAC) acting as a dial or network access server extends a PPP session across a backbone using L2TP to a remote L2TP Network Server (LNS). The operation of initiating the PPP session to the LAC is transparent to the user. BACK
VOLUNTARY TUNNEL
Voluntary tunnel refers to the case where an individual host connects to a remote site using a tunnel originating on the host, with no involvement from intermediate network nodes. Tunnel mechanism chosen can be IPSec or L2TP.
A Virtual Private LAN Segment (VPLS) is the emulation of a LAN segment using internet facilities.
INTRANET VPN
The branch office scenario securely connects two trusted intranets within the organization. Routers or firewalls acting as gateways for the office with vpn capabilities can be used to protect the corporate traffic.
EXTRANET VPN
In this scenario multiple supplier intranets that need to access a common corporate network over the Internet. Each supplier is allowed access to only a limited set of destinations within the corporate network.
A remote user wants to be able to communicate securely and cost-effectively to his corporate intranet. This can be done by use of an VPN IPSec enabled remote client and firewall (or gateway).
TUNNELING
tunneling is the process of placing an entire packet within another packet and sending it over a network.
EXAMPLE OF TUNNELING
TUNNELING (cont)
The truck is the carrier protocol, the box is the encapsulating protocol and the computer is the passenger protocol.
VPN PROTOCOLS
1. PPTP (Point-to-point tunneling protocol) 2. IPsec (IP security). 3. L2TP (layer2 transmission protocol).
NEXT
BACK
BACK
SECURITY OF VPN
Desktop software client for each remote user Dedicated hardware such as a VPN Concentrator or Secure PIX Firewall Dedicated VPN server for dial-up services NAS (Network Access Server) used by service provider for remote user VPN access
VPN CONCENTRATOR
It incorporates the most advanced encryption and authentication techniques for Remote access VPN.
VPN-OPTIMIZED ROUTER
PIX FIREWALL
Firewall combines dynamic network address translation, proxy server, packet filtration, firewall and VPN capabilities in a single piece of hardware.
VPN/VOIP Application
ADVANTAGES OF VPN
Cost saving. Reduces the long distance charges of electronic transactions. Concrete security.
DISADVANTAGES OF VPN
VPNs require an in-depth understanding of public network security issues and taking proper precautions in VPN deployment. The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control.
VPN technologies from different vendors may not work well together due to immature standards.
CONCLUSION
From this we can conclude that VPN provides a very safe , secure and cost-effective communication infrastructure.