210 likes | 329 Views
Virtual Private Network (VPN). Donnie Miles Holly Murray Kevin Osborn Wayne Roussel. March 15 th , 2000. Topics of Discussion. What is VPN? Why use VPN? What are the elements of VPN? How does VPN work? How does VPN keep data secure?. ?. What is VPN?. Virtual Private Network (VPN)
E N D
Virtual Private Network (VPN) Donnie Miles Holly Murray Kevin Osborn Wayne Roussel March 15th, 2000
Topics of Discussion • What is VPN? • Why use VPN? • What are the elements of VPN? • How does VPN work? • How does VPN keep data secure? ?
What is VPN? • Virtual Private Network (VPN) • Connects remote users who belong to a private network • Allows private communications over a public network
Who is using VPN technology? • Perot Systems Corp. • Switching to a VPN saved them $1,100/month • DMR Consulting • A VPN not only saves money but it also helps develop a team spirit
Why use VPN? • Remote access to the corporate network is required (individual users and business branches) • Toll calls for connection are expensive • The internet is public
Why use VPN? • Connectivity – access can be gained from virtually anywhere • Cost – long distance charges and leased phone lines cost $1000’s – VPN can save 70%-80% • Remote users “feel” like part of the company
What are the elements of VPN? • Server hardware/software • Client hardware/software
How does VPN work? • Server VPN is configured to accept communications. • Client initiates contact • Server and Client connect and create a “tunnel”
End-to-End tunneling Tunneling Tunneling is at the heart of all VPN implementations. There are 2 generic classes of tunnels: • Node-to-Node tunneling
End-to-End Tunneling • Extends from a remote user’s PC to the server that it is connecting to • The devices at each end of the connection must handle the establishment of the tunnels • The devices must encrypt & decrypt the data passed between the 2 points
Node-to-Node Tunneling • The tunnel terminates at the edge of the network. • Could be used to connect LANs in different sites. • The traffic on each LAN is unchanged. • Once traffic passes through, it is encrypted & tunneled to a similar device at the second site. • It is then decrypted & put onto the LAN
= Secure tunnels
Tunneling Protocols • IP Security (IPSec) • Layer 2 Tunneling Protocol (L2TP) • Point-to-Point Tunneling Protocol (PPTP) • Proprietary Tunneling Protocols
Point-to-Point Tunneling Protocol • Most Widely used • Microsoft supports it within Windows • Many IT managers use it to test VPNs • Typically used in end-to-end tunneling applications
Layer 2 Tunneling Protocol • Came out of a mix of the PPTP world & a tunneling protocol-Layer 2 forwarding • Developed by Cisco • Frequently used in node-to-node applications
IP Security • Developed by the Internet Engineering Task Force to protect IP packets • Commonly used in both end-to-end as well as node-to-node applications • The automotive industry uses IPSec
Proprietary Tunneling Protocols • Trade-off: • Standards-based approaches offer some assurance of interoperability • Proprietary approaches promise some performance enhancements • Must use one vendor’s equipment
How does VPN keep the data secure? • Encryption • Private Key • Public Key • Certificate • Is encryption a friend or a foe?
Remember… somebody may be watching you!
Sources: • Information Week Online; “Public Key Infrastructure Becomes E-Commerce Enabler” by Larry Kahaner; March 20, 2000; • “What is VPN?”; www.rad.com/networks/1998/vpn/ • ZDNet; “A Modest Proposal” by Ray Ozzie; February 13, 2001 • Internet Week; “VPN Implementation Calls For A Tunnel Trip” by Salvatore Salamone; December 14, 1998 • The Shiva Company at www.europe.shiva.com • Tina Bird at http://kubarb.phsx.ukans.edu/ • Baltimore Technologies at www.baltimore.com