Seminar On Virtual Private Network: Prepared by
Seminar On Virtual Private Network: Prepared by
PRIVATE NETWORK
PREPARED BY:
GUIDED BY:
G.T CHAVAN SIR
VIRTUAL PRIVATE
NETWORK
Definition and introductory notes
VPN is the network which uses
open distributed infrastructure of
the internet to transmit data
between corporate sites.
NEED FOR DEVELOPING
VPN
Remote employees interested to
access database of corporations.
Corporate sites developing new
relations.
Increasing growth of the corporation.
VPN RESOLVES THE
PROBLEM
It provides flexibility and scalability
Cost advantage.
training.
WORKING OF VPN
STEP1…
STEP2…
STEP3…
STEP4…
WORKING-STEP1 (cont…)
The remote user dials into their local ISP and
logs into the ISP’s network as usual.
BACK
WORKING-STEP2 (cont…)
When connectivity to the corporate network is
desired, the user initiates a tunnel request to
the destination Security server
• BACK
WORKING-STEP3 (cont…)
The user then sends data through the tunnel which encrypted by the VPN software before
being sent over the ISP connection
BACK
WORKING-STEP4 (cont…)
The destination Security server receives
the encrypted data and decrypts.
TYPES OF VPN
VLL-Virtual leased lines.
VPRN-virtual private routed network.
Intranet VPN.
Extranet VPN.
1… compulsory tunnel.
2… voluntary tunnel.
COMPULSORY TUNNEL
In this scenario L2TP
Access Contractor
(LAC) acting as a dial
or network access
server extends a PPP
session across a
backbone using L2TP
to a remote L2TP
Network Server
(LNS). The operation
of initiating the PPP
session to the LAC is
transparent to the
user.
BACK
VOLUNTARY TUNNEL
Voluntary tunnel
refers to the case
where an individual
host connects to a
remote site using a
tunnel originating on
the host, with no
involvement from
intermediate network
nodes. Tunnel
mechanism chosen can
be IPSec or L2TP.
VIRTUAL PRIVATE LAN
SEGMENTS
A Virtual
Private LAN
Segment (VPLS)
is the emulation
of a LAN
segment using
internet
facilities.
INTRANET VPN
The branch office
scenario securely
connects two
trusted intranets
within the
organization.
Routers or
firewalls acting as
gateways for the
office with vpn
capabilities can be
used to protect the
corporate traffic.
EXTRANET VPN
In this scenario multiple supplier intranets that need to
access a common corporate network over the Internet.
Each supplier is allowed access to only a limited set of
destinations within the corporate network.
REMOTE ACCESS VPN
A remote user wants to be able to communicate securely
and cost-effectively to his corporate intranet. This can be
done by use of an VPN IPSec enabled remote client and
firewall (or gateway).
TUNNELING
tunneling is the process of placing an entire packet within
another packet and sending it over a network.
Tunneling requires three different protocols
1… Carrier protocol
2… Encapsulating protocol
3… Passenger protocol
EXAMPLE OF TUNNELING
TUNNELING (cont…)
The truck is the carrier protocol, the box is the
encapsulating protocol and the computer is the passenger
protocol.
VPN PROTOCOLS
1. PPTP (Point-to-point tunneling
protocol)
2. IPsec (IP security).
NEXT
POINT TO POINT
TUNNELING PROTOCOL
Introduction to PPTP.
How actually PPTP works ???
Advantages of PPTP.
Disadvantages of PPTP.
BACK
INTERNET PROTOCOL
SECURITY
Introduction to IP security.
Features of IP security.
BACK
SECURITY OF VPN
Hardware solution
Remote access control.
CERTAIN H/W AND S/W
SPECIFICATIONS…
Desktop software client for each remote
user
Dedicated hardware such as a VPN
Concentrator or Secure
PIX Firewall
Dedicated VPN server for dial-up services
NAS (Network Access Server) used by
service provider for
remote user VPN access
VPN CONCENTRATOR
It incorporates the
most advanced
encryption and
authentication
techniques for
Remote access
VPN.
VPN-OPTIMIZED ROUTER
VPN-optimized
routers provide
scalability, routing,
security and quality
of service.
PIX FIREWALL
Firewall combines
dynamic network
address
translation, proxy
server, packet
filtration, firewall
and VPN
capabilities in a
single piece of
hardware.
VPN/VOIP Application
ADVANTAGES OF VPN
Cost saving.
Reduces the long distance charges of
electronic transactions.
Concrete security.
DISADVANTAGES OF VPN
VPNs require an in-depth understanding of public
network security issues and taking proper
precautions in VPN deployment.