Donnie Miles - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Donnie Miles

Description:

Connects remote users who belong to a private network. Allows private communications over a ... ZDNet; 'A Modest Proposal' by Ray Ozzie; February 13, 2001 ... – PowerPoint PPT presentation

Number of Views:30
Avg rating:3.0/5.0
Slides: 22
Provided by: cltAs
Category:
Tags: donnie | miles | zdnet

less

Transcript and Presenter's Notes

Title: Donnie Miles


1

Virtual Private Network (VPN)
  • Donnie Miles
  • Holly Murray
  • Kevin Osborn
  • Wayne Roussel

March 15th, 2000
2
Topics of Discussion
  • What is VPN?
  • Why use VPN?
  • What are the elements of VPN?
  • How does VPN work?
  • How does VPN keep data secure?

?
3
What is VPN?
  • Virtual Private Network (VPN)
  • Connects remote users who belong to a private
    network
  • Allows private communications over a public
    network

4
Who is using VPN technology?
  • Perot Systems Corp.
  • Switching to a VPN saved them 1,100/month
  • DMR Consulting
  • A VPN not only saves money but it also helps
    develop a team spirit

5
Why use VPN?
  • Remote access to the corporate network is
    required (individual users and business branches)
  • Toll calls for connection are expensive
  • The internet is public

6
Why use VPN?
  • Connectivity access can be gained from
    virtually anywhere
  • Cost long distance charges and leased phone
    lines cost 1000s VPN can save 70-80
  • Remote users feel like part of the company

7
What are the elements of VPN?
  • Server hardware/software
  • Client hardware/software

8
How does VPN work?
  • Server VPN is configured to accept
    communications.
  • Client initiates contact
  • Server and Client connect and create a tunnel

9
Tunneling
Tunneling is at the heart of all VPN
implementations. There are 2 generic classes of
tunnels
  • End-to-End tunneling
  • Node-to-Node tunneling

10
End-to-End Tunneling
  • Extends from a remote users PC to the server
    that it is connecting to
  • The devices at each end of the connection must
    handle the establishment of the tunnels
  • The devices must encrypt decrypt the data
    passed between the 2 points

11
Node-to-Node Tunneling
  • The tunnel terminates at the edge of the network.
  • Could be used to connect LANs in different sites.
  • The traffic on each LAN is unchanged.
  • Once traffic passes through, it is encrypted
    tunneled to a similar device at the second site.
  • It is then decrypted put onto the LAN

12
(No Transcript)
13
Secure tunnels
14
Tunneling Protocols
  • IP Security (IPSec)
  • Layer 2 Tunneling Protocol (L2TP)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Proprietary Tunneling Protocols

15
Point-to-Point Tunneling Protocol
  • Most Widely used
  • Microsoft supports it within Windows
  • Many IT managers use it to test VPNs
  • Typically used in end-to-end tunneling
    applications

16
Layer 2 Tunneling Protocol
  • Came out of a mix of the PPTP world a tunneling
    protocol-Layer 2 forwarding
  • Developed by Cisco
  • Frequently used in node-to-node applications

17
IP Security
  • Developed by the Internet Engineering Task Force
    to protect IP packets
  • Commonly used in both end-to-end as well as
    node-to-node applications
  • The automotive industry uses IPSec

18
Proprietary Tunneling Protocols
  • Trade-off
  • Standards-based approaches offer some assurance
    of interoperability
  • Proprietary approaches promise some performance
    enhancements
  • Must use one vendors equipment

19
How does VPN keep the data secure?
  • Encryption
  • Private Key
  • Public Key
  • Certificate
  • Is encryption a friend or a foe?

20
Remember somebody may be watching you!
21
Sources
  • Information Week Online Public Key
    Infrastructure Becomes E-Commerce Enabler by
    Larry Kahaner March 20, 2000
  • What is VPN? www.rad.com/networks/1998/vpn/
  • ZDNet A Modest Proposal by Ray Ozzie February
    13, 2001
  • Internet Week VPN Implementation Calls For A
    Tunnel Trip by Salvatore Salamone December 14,
    1998
  • The Shiva Company at www.europe.shiva.com
  • Tina Bird at http//kubarb.phsx.ukans.edu/
  • Baltimore Technologies at www.baltimore.com
Write a Comment
User Comments (0)
About PowerShow.com