210 likes | 374 Views
Virtual Private Network. “The Virtual Netters” Loraine Cano Mahesh Sridharan Rajnikanth Jaipaul. What is a Virtual Private Network?. “The service of the Millenium” VPN typically uses the internet as the transport backbone to establish secure links.
E N D
Virtual Private Network “The Virtual Netters” Loraine Cano Mahesh Sridharan Rajnikanth Jaipaul
What is a Virtual Private Network? • “The service of the Millenium” • VPN typically uses the internet as the transport backbone to establish secure links. • The client is “virtually” on the corporate network and can be physically countries away.
Who is the Competitive Edge for? • Service Provider • Subscriber • Efficiency • Profitability • Continuous growth
What does a VPN offer? • Low Cost and High Flexibility • The remote user can get network access by making a local call, reducing both line charges and equipment costs substantially.
In –House RAS Outsourced VPN Total Users 100 100 Local Usage (hrs/Month) 300 300 long-distance (hrs/Month) 2100 2100 800#/ International Usage 0 0 Monthly Telco Charges 12600 0 User Internet Access ($20/month) 0 2000 Backbone Internet Access (TI) 1000 1000 Monthly Connectivity Fees 1000 3000 RAS Equipment Maintenance 200 0 In-House4 User Support Staff 1250 0 RAS Equipment Depreciation 278 0 VPN Remote Access (+$40/User) 0 4000 Monthly Infrastructure Cost 1728 4000 Total Monthly Cost 15328 7,000 Savings per Month - 8,328 (54%) Month to Recover Investment. - <2
What Are the Issues involved with VPN? • Piecemeal approach and lack of standards • Decreases security • Traffic control • Enterprise Management
What are the 3 types of VPNs? • Remote Access • Extranet • Intranet
What is Remote Access VPN? Remote Access
Tunnelling Protocols • Layer 2 Protocol • Layer 3 Protocol • IP Sec
User Authentication • Password Authentication Protocol. • Challenge-Handshake Authentication Protocol (CHAP)
Types of Tunnels • Voluntary Tunnel • Compulsory Tunnel
What are the features of VPN ? • Security • Traffic Control • Enterprise Management
How is security ensured ? • Access Control • Authentication • Encryption • Symmetric Encryption • Asymmetric Encryption • Firewall • before VPN Server • after VPN Server
How to choose VPN solution ? • ISP Use • VPN Application • Tunneling Protocols
Remote Access Example • Rajni (Lubbock) connects to Mahesh Inc. (Dallas) • Rajni dials into local ISP • When connectivity to Mahesh Inc is established, client initiates tunnel request to destination server • The VPN server authenticates and creates end of tunnel • Rajni sends encrypted data over ISP • VPN server decrypts data • Any information sent back to Rajni is also encrypted