320 likes | 514 Views
Virtual Private Networks (VPNs). By Ryan Joyce. What is a Virtual Network ? An interconnected group of networks (an internet) that appears as one large network to a specific user What is a Virtual Private Network? A Virtual Private Network is a Virtual
E N D
Virtual Private Networks(VPNs) By Ryan Joyce
What is a Virtual Network ? An interconnected group of networks (an internet) that appears as one large network to a specific user What is a Virtual Private Network? A Virtual Private Network is a Virtual Network that is secure and has attributes of LAN but over much larger scale.
History of VPNs • Started with • Wide Area Networks (WANS) • Expansive leased lines • reliable • secure • Very expensive • Intranets (LANs) • Limited • reliable • Secure • Relatively inexpensive
History (continued) • Virtual Private Networks are relatively new • Technology was created in the mid 90s • Was not made mains stream until couple years ago
Why have VPNs? • Extend communications on a global scale • Create better communication with business partners • Decrease the cost of having to use traditional methods • Faster more effective reliable business
Video • VPN Video
VPN Setups • Variety of Options • Hardware based • VPN firewalls • edge routers • Software base • VPN clients • Mixed
VPN Setups • Remote Users • Refers to communication access of a company’s network to remote or mobile employees (home users) • Requires monitoring and strong authentication practices • Scalability remains and important issue must be able to handle larger number of users.
Remote Setup mobile user Encryption Router INTERNET Home user LAN A
VPN Setups • Intranet Setup • Refers to linking a companies internal branches or subsidiaries together • Requires high security, must be able to transmit and receive sensitive information • Requires high reliability, applications that effect day to day operations • Scalable to a point.
Intranet based Encryption Router LANB INTERNET LAN A Encryption Router
VPN Setups • Extranet Setups • Refers to VPN between companies customers and suppliers • Requires standardization the IPSec current standard for VPNs • Need for traffic control, networks must be monitored for accurate delivery of critical data
Extranet Based Encryption Router LAN A INTERNET Suppliers LAN Encryption Router
How VPNS work? • Tunneling • Creating a secure point to point connection over a public network. • Each box represents encapsulation Datagram Header Encrypted Transport Datagram Original Datagram
Security Requirements and Approaches • Confidentiality • refers to the privacy of information being exchanged between communicating parties. • Encryption • secret key cryptography • Public key cryptography
Encryption • Public Key • Private Key • MD5 • Message digest “hashing” algorrithm • SET protocol • Secure electronic transactions • SSl protocol • Secure socket layer protocol
Security Requirements and Approaches • Data Integrity • Integrity ensures that information being transmitted over the public Internet is not altered in any way during transit. • Insuring Data • One way hash functions • Message-authentication codes • Digital signatures
Security Requirements and Approaches • Authentication • Ensuring the identities of all communicating parties. • Authentication practices • Password authentication • Digital certificates • Token cards created from a time stamp
VPN Protocols • IPSec (Internet Protocol Security) • Developed by IETF • designed to address IP based networks • encapsulates a packet with another packet and encrypts the packet • PPTP (Point to Point Tunneling Protocol) • Used for remote users • Encapsulates packets
VPN Protocols(continued) • L2TP (Layer 2 tunneling protocol) • Evolved from PPTP • Client aware tunneling • Client transparent tunneling • Socks5 • Circuit level protocol • Originally designed to authenticate protocols • mainly use for extranet configurations • great for user level application control
Selecting A VPN • Things to consider • Integration • Will it be compatible with existing intranets • Software versus Hardware • Software cheap more difficult to implement less reliable slower • Hardware more expensive easy to set up more reliable faster
Applications of VPNs • Manufacturing • Factory operations linking corporate headquarters to all of its facilities • Retail • Local stores connected directly to regional offices delivering relevant sales data • Medical • Transferring patient data across hospital networks • Finance • Online banking transactions, remote user access
Applications VPNs • Home users • Windows VPN connection • VPN Connection Video
Problems with VPNs • Setup Times • Difficult Trouble Shooting • Interoperability with other networks • Reliability with ISPs • Bandwidth Constraints
Optimizing VPNs Single VPN Two path ways
Optimizing VPNs • Multi VPNs Multi pathways
The Future of VPNs • Protocol Standardization • New hardware • Better Software • Used more frequently • Will become the new business standard
References • Dunigan, Tom. Virtual Private Networks Retrieved October 15, 2007 Posted October 13, 2004 http://www.csm.ornl.gov/~dunigan/vpn.html • McDonald, Christopher. Virtual Private Networks An overview RetrievedOctober 16, 2007 from Intranet Journal.com http://www.intranetjournal.com/foundation/vpn-1.shtml • Virtual Private Networks. Retrieved October 16, 2007 from Cisco Posted October 12 , 2006. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/vpn.htm • Virtual Private Networking Retrieved October 15, 2007 http://www.microsoft.com/technet/isa/2004/help/fw_VPNIntro.mspx?mfr=true