Upload
unchanged-dev
View
181
Download
15
Tags:
Embed Size (px)
Citation preview
Presented by:
Debasis Chowdhury – 10208016Md. Shariar Islam – 10208026Antara Chowdhury – 10208036University of Asia Pacific
A technology that creates a network that is physically public, but virtually private.
Leased lines
Leased lines
Leased lines
Leased
lines
Virtual Private Networks (VPN) Basic Architecture
VIRTUAL .
PRIVATE .
NETWORK .
TUNNELING.
ENCRYPTION.
ENCAPSULATION.
AUTHENTICATION.
FIREWALL.
•Tunneling is the process of placing an entire packet within another packet before it's transported over the Internet.
• That outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.
Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP) Internet Protocol Security (IPsec)
Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it.
Used to convert data to a secret code for transmission over an trusted network
EncryptionAlgorithm
“The cow jumped over the moon”
“4hsd4e3mjvd3sda1d38esdf2w4d”
Clear TextClear Text Encrypted TextEncrypted Text
For data encapsulation, VPN relies on either of the following technologies like GRE , IPSec, L2F,PPTP and L2TP .
In which IPsec and PPTP are more popular.
Authentication process determine if the sender is the authorized person and if the data has been redirect or corrupted .
There are 2 levels of Authentication.
Computer-Level Authentication User-level Authentication
Firewall provides network security and business continuity .
It prevents attacks, and secures your data communications with multiple parallel Virtual Private Network (VPN) connections.
There are two approaches to using a firewall with a VPN server:
VPN server in front of the firewall..
VPN server behind the firewall..
All traffic on the secure VPN must be encrypted and authenticated.
The security properties of the VPN must be agreed to by all parties in the VPN.
No one outside the VPN can affect the security properties of the VPN.
Remote access VPNSite to Site VPN
Provides access to internal corporate network over the Internet.
Reduces long distance, modem bank, and technical support costs.
InternetInternet
CorporateSite
Connects multiple offices over Internet
Reduces dependencies on frame relay and leased lines
InternetInternet
BranchOffice
CorporateSite
Site-to-Site VPN Extranet VPN
▪ Provides business partners access to critical information (leads, sales tools, etc)
▪ Reduces transaction and operational costs
CorporateSite
InternetInternet
Partner #1
Partner #2
Site-to-Site VPN Intranet VPN:
Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.
InternetInternet
LAN clients
Database Server
LAN clients with sensitive data
SecurityReliabilityCost SavingsExpand GloballyEasierNo single point of failureEasier Network Management
Lower bandwidth available compared to dial-in line
Inconsistent remote access performance due to changes in Internet connectivity
No entrance into the network if the Internet connection is broken