You are on page 1of 27

VPN: Virtual Private Network

Presented By:
Gregg Dowdy Liz Farricker Whitney Mayoras

Outline
     

Introductions What is it? Overview Security/Tunneling Advantages and Disadvantages Demonstration

Introductions


Gregg
 

BSG Student Developer Unified Western Grocers Retail Technology Specialist BSG Business Analyst ResNet Network Technician COB CRC: Tier 2/3 Support Technician BSG Student Tester/Analyst

Liz
  

Whitney


VPN: What is it?


 

Virtual Private Network Remote network communication through Internet Used by companies/organizations who want to communicate confidentially Two parts:
 

Protected or inside network Outside network or segment (less trustworthy)

VPN: Types


Secure VPNs use cryptographic tunneling protocols.




IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3, VPN-Q and MPVPN

Trusted VPNs rely on the security of a single providers network to protect the traffic.


MPLS and L2F

VPN: Security
  

Encryption IPSec Authentication


 

User/System and Data AAA Servers


(Authentication, Authorization, and Accounting)

Firewalls

VPN: Tunneling


Requires 3 protocols


Carrier


Default network protocol Original data GRE, IPSec, L2F, PPTP, L2TP

Passenger


Encapsulation


VPN: Encapsulation

Figure 1

VPN: Tunneling (cont.)




Two Basic types of tunneling




Site-to-Site


Typically uses GRE Typically uses PPP

Remote-Access


VPN: Advantages
    

Cost Effective Greater scalability Easy to add/remove users Mobility Security

VPN: Disadvantages
  

Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors

VPN Demonstration
Click on Start select Network Connections

VPN Demonstration
In Network Connections on the left hand side there is a link to Create New Connection click on this and a wizard will pop up assisting the user

VPN Demonstration
Select Connect to the Network at my Workplace

VPN Demonstration
Select Virtual Private Network Connection

VPN Demonstration
Make a name for this connection that you are establishing to distinguish this connection from other VPN connections that might already be established

VPN Demonstration
For this demonstration I am trying to connect to my wireless router off campus therefore the IP address that I insert is the IP address for my router which I can find out by running an ipconfig and it is the IP address for your default gateway NOTE: Not all routers will allow users to VPN into it

VPN Demonstration
Personal preference as to whether or not you want other users to be able to use this VPN connection on this computer

VPN Demonstration

VPN Demonstration

VPN Demonstration
This is a profile (username and password) that has already been created on your router which can be created by typing in the IP address of your router in a web browser

VPN Demonstration

VPN Demonstration

In Start Run insert the IP address of the computer that you want to access that is connected to the router

VPN Demonstration
Using the same username and password already established for the router you can connect to this specific computer

VPN Demonstration

These are only the files that are shared on this computer

How to Connect to OSU:

    

How to connect to OSU: Dave Sullivan made a helpful Tutorial First on the Engineering Website you have to download the Cisco VPN Client One must acquire authorization information prior to using the VPN service Once registration is complete you download the appropriate client depending on your operating system; and follow the steps to complete the connection

References


[Figure 1]
<www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>

Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>. Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>. "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.

You might also like