1 / 17

Virtual Private Networks

Eric Kilroy. Virtual Private Networks. Introduction. Virtual Private Network A way to connect to a private network through a public network such as the internet. Governing Standards Body. Virtual Private Networks are not governed by one specific body.

Download Presentation

Virtual Private Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Eric Kilroy Virtual Private Networks

  2. Introduction • Virtual Private Network • A way to connect to a private network through a public network such as the internet.

  3. Governing Standards Body • Virtual Private Networks are not governed by one specific body. • Each Virtual Private Network is privately maintained and operated. • Every private network has a Network Administrator who oversees the usage of the network.

  4. History • Companies spent massive resources to set up private networks known as Intranets. • Intranets were costly and used leased line services, ATM, and Frame Relay to incorporate remote users. • Companies used remote access servers or ISDN for small sites and mobile workers. • SMEs were forced to use low speed switched services due to lack of money.

  5. History • The internet became easier to access and bandwidth grew in capacity. • Companies put their Intranets on the web to make Extranets. • This linked internal and external users. • Although this was cost effective and quick and easy to do, it raised the issue of security

  6. Specifications • The modern VPN covers the security factor. • VPNs now use tunneling and complex encryption. • Privacy and data security is maintained in what is much like a dedicated point-to-point connection. • Because of the use of a public network, like the internet, VPNs are much less costly than Intranets.

  7. Specifications • Early VPNs were complex and needed experts on hand to maintain. • Technology has come a long way, making it an easy and cheap solution for businesses. • With VPNs, companies can unite workers in different branches, different project teams, customers, mobile workers, and even workers from home.

  8. Specifications • Workers and customers can connect securely by connecting to the POP or (point-of-presence) • VPNs save money by reducing long distance charges, network support fees, equipment inventories, and leased line fees.

  9. Specifications • VPNs use security techniques such as tunneling and encryption to protect their data. • Encryption is a way to scramble information. • When the text is encrypted it is referred to as cipher-text. • When the data is decrypted it is called clear-text.

  10. Specifications • Encryption • Data gets encrypted at a gateway at the start of the VPN tunnel. • The Gateway at the receiving end decrypts the information into clear-text. • The encryption uses the Data Encryption Standard.

  11. Specifications • Encryption • The Data Encryption Standard or DES uses 56-bit keys to encrypt data. • Data is encrypted into 64-bit blocks. • This provides 72,057,594,037,927,900 different possible combinations. • 3DES encrypts data multiple times. • Encrypts using 56-bit key • Decrypts into completely different clear-text • Encrypts again

  12. Specifications • Keys • Keys are what make encryption work. • The length of the key determines security strength • 8-bit keys 256 (28) combinations • 16-bit keys 65,536 (216) combinations • 56-bit keys 72,057,594,037,927,900 (256) combinations • Many VPNs today use 168-bit keys • That’s 374,144,419,156,711,000,000,000,000,000,000,000,000,000,000,000,000 combinations

  13. Specifications • Keys • Symmetrical keys means using the same key at both ends of the tunnel. • Keys must be kept confidential by both parties because of security concerns. • Become difficult to distribute • Asymmetrical keys easier to manage • Uses private and public keys. • Private used on one end. • Public given out to remote users

  14. Specifications • VPNs use IPSec or IP Security Protocol • Internet standard protocol for tunneling, authentication, and encryption. • Addresses issues • Access Control • Connection Integrity • Authentication of Data Origin • Protection Against Replays • Traffic Flow Confidentiality

  15. Advantages/Drawbacks • VPNs are secure • Privacy is not a big issue • VPNs are interoperable. They are useable on many different systems. • They are easy to use and cost effective to maintain.

  16. Application • VPNs are used by many different companies. • It can be on different systems to connect remote users to the company

  17. Questions?

More Related