1 / 11

VPN Basics

VPN Basics. By Kevin Stevens UAT NTS4150. VPN. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public networks. Types of VPN’s. Hardware – A dedicated appliance specifically for use as a VPN. -High performance

ezra
Download Presentation

VPN Basics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VPN Basics By Kevin Stevens UAT NTS4150

  2. VPN Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public networks

  3. Types of VPN’s Hardware – A dedicated appliance specifically for use as a VPN. -High performance -Quick implementation for large scale deployment Examples: SonicWALL NSA E8500

  4. Types of VPN’s Software – Software based VPN that can be installed on existing infrastructure. -Lower capex (Possibly free) -Better compatibility with mixed environments Examples: OpenVPN, OpenSwan

  5. VPN Advantages • Cost efficient compared to dedicated lines • Ability to secure traffic through public networks • Faster deployment than other solutions

  6. VPN Disadvantages • No control over Internet bandwidth • Increase in network administration • Incompatibility issues • Can open remote vectors of attack

  7. VPN Configurations • Remote Access – establishes a remote connection on a client/server basis. Typically seen with telecommuters. • Network to network (site to site) – connects remote offices via end points.

  8. VPN Tunneling Protocols IPSec – Operates at the network layer. Provides functionality to encrypt and authenticate IP data. PPTP – Point-to-Point tunneling protocol. Operates at the Data link layer. Uses PPP to encapsulate data. L2TP – Layer 2 Tunneling Protocol. Operates at the Data link layer. Uses PPP to encapsulate data. A combination of L2F and PPTP. SSL – Works at different levels of the OSI, giving it flexibility.

  9. VPN Encryption Schemes VPN’s can be setup with a myriad of encryption schemes. Here are some of the basics: PPP – can provide encryption through Microsoft's Point-to-Point Encryption Protocol (MPPE). MPPE uses the RSA RC4 encryption algorithm. IPsec – provides encryption through the Encapsulating Security Payload (ESP). Supports various encryption algorithms. SSL/TLS – provides a variety of encryption algorithms.

  10. *Note* The Virtual Private Network Consortium only supports the following secure VPN technologies: • IPsec with encryption • L2TP inside of IPsec • SSL with encryption

  11. References Krutz L., R., & Vines, R. D. (2007). The CISSP and CAP Prep Guide. Indianapolis: Wiley Publishing. Merkow, M., & Breithaupt, J. (2006). Information Security Principles and Practice. Upper Saddle River: Prentice Hall. Northcutt, S., Zeltser, L., Winters, S., & Kent, K. R. (2005). Inside Network Security.Sams Publishing. VPN Technologies: Definitions and Requirements. (n.d.). Retrieved November 28, 2010, from http://www.vpnc.org/vpn-technologies.html

More Related