View
31
Download
0
Category
Tags:
Preview:
DESCRIPTION
FINAL YEAR PROJECT. IMPLEMENTATION OF VPN USING IPSEC. GROUP MEMBERS. M.UZAIR NASIR 2K5-CSE-153 AHSAN EJAZ 2K5-CSE-163 RANA.M.KAMRAN 2K5-CSE-164 HUMAYUN KHAN 2K5-CSE-169. VPN. - PowerPoint PPT Presentation
Citation preview
4
GROUP MEMBERS
• M.UZAIR NASIR 2K5-CSE-153
• AHSAN EJAZ 2K5-CSE-163
• RANA.M.KAMRAN 2K5-CSE-164
• HUMAYUN KHAN 2K5-CSE-169
5
VPN
• To Create a Secure tunnel over the public network (internet) is called Virtual Private Network
6
VPN Types
• Overlay VPN– Layer 2 VPN
• L2TP
– Layer 3 VPN• IPSec• GRE Tunneling
• Peer-to-Peer VPN– MPLS VPN
7
IPSec VPN
• IPSec is a set of security protocols and algorithms used to secure data at the network layer
8
WHY WE USE IPSEC?
• IP Packets have no inherent security
• No Way To Verify – The claimed sender is a true sender– The data has not been modified in transit– The data has not been viewed by third party
• IP sec Provide Automated Solution for these areas
10
IPSec Protocols
• IPSec uses two main protocols to create a security framework– Encapsulating Security Payload (ESP)– Authentication Header (AH)
11
IPSec VPN
• We can implement IPSec VPN in different Scenario– Site-to-Site VPN– Remote Access VPN
13
IMPLEMENTATION1st scenario
• PROBLEM
Site1 Site2
DATA
INTERNETINTERNET
HACKER
Data is viewed by third party
DATA
THIS IS A HUGE PROBLEM
14
IMPLEMENTATION1st scenario
• SOLUTIONSite1 Site2
DATA INTERNETINTERNET
HACKER
Third party is unable to view
data
DATA
TUNNELTUNNEL VPN VPN
Recommended