Professional Documents
Culture Documents
TEL 581
Presented by
Viswesh Prabhu Subramanian
Gregory Michel
Lincoln Jean Louis
Contents:
◦ What is a VPN?
◦ VPN Types
◦ VPN Security
◦ VPN gateways
◦ Introduction to VPN protocols
◦ Pros and cons of VPN
◦ Tunneling protocols
What is tunneling
IPSec
PPP
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Layer 2 Forwarding (L2F)
◦ Authentication Protocols
Password Authentication Protocol (PAP)
Challenge Handshake Protocol (Chap)
PAP vs Chap
Extensible Authentication Protocol.
◦ Summary.
Access Guidelines
Short video about VPN from
Teracom Training Institute.
http://www.yousearchblog.com/video/1Q6wKa1IaIA/Acronyms%20and
%20Abbreviations
What is a VPN?
http://www.uniforum.chi.il.us/slides/baker-vpn/vpn.ppt
A VIRTUAL Private Network replaces all of the above
utilizing the public Internet Performance and
availability depend on your ISP and the Internet
http://www.uniforum.chi.il.us/slides/baker-vpn/vpn.ppt
http://www.uniforum.chi.il.us/slides/baker-vpn/vpn.ppt
VPN Security
http://lylebeckportfolio.com/vpn.htm
• VPN gateways can be categorized as Standalone
or Integrated.
• Standalone VPNs incorporate purpose-built
devices between - the source of data and WAN
link or between the modem and a data source in
a remote office.
• Integrated implementations add VPN
functionality to existing devices such as routers,
firewalls.
• Router based VPNs – adding encryption
support to existing router(s) can keep the
upgrade costs of VPN low.
• Firewall based VPNs – workable solution for
small networks with low traffic volume.
• Software based VPNs – good solution for better
understanding a VPN, software runs on existing
servers and share resources with them
2 main VPN architectures:
•There are products based on IPSec and Point to
Point Tunneling Protocol (PPTP) or L2TP (Layer 2
Tunneling Protocol)
•Although IP sec has become the de facto standard
for LAN to LAN VPN’s, PPTP and L2TP are heavily
used for single client to LAN connections.
•Therefore, many VPN products support IPSec, PPTP
and L2TP.
• Lower costs – remote access costs have reduced
by 80 percent while LAN-to-LAN connectivity
costs is reduced by 20-40 percent.
• VPN provides low-cost alternative to backbone
equipment, in-house terminal equipment and
access modems.
• Connectivity Improvements – VPN based links
are easy and inexpensive ways to meet changing
business demands.
• Anywhere anytime access – ubiquitous public
internet offers transparent access to central
corporate systems i.e. email, directories, internal-
external web-sites.
VPN technology is improving rapidly and
promises a bright future for data communication,
its cost-effective, and high returns on investment
will outweigh any skittishness in investing in new
technology.
Disadvantages of VPN
• The availability and performances of VPN networks are
difficult to control
•PAP vs Chap