SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Virtual Private Networks (VPNs) ,[object Object]
Defining Some Terms Intranet Internal corporate applications using Web and Internet technology Extranet Extends an Intranet to include customers, suppliers and partners Remote Access Uses the Internet to link telecommuters and mobile workers to the company Intranet
Tunneling Defined ,[object Object]
Tunneling Explained ,[object Object],[object Object],[object Object],[object Object]
One way to communicate… Router CSU/DSU LAN LAN Firewall LAN Web Sites Los Angeles HQ New York Boston CSU/DSU Router Firewall CSU/DSU Router PSTN Remote Access Server Internet CSU/DSU Firewall Remote Access Server
Another view of network possibilities...  A Virtual Private Network Internet Router VSU-1000 CSU/DSU LAN LAN Firewall LAN Web Sites Los Angeles New York Boston Remote Clients (VPNremote) CSU/DSU VSU-1000 Router Firewall CSU/DSU VSU-1000 Router VPNmanager VSU-1000
Tunneling Illustrated Router A Workstation X Router B Workstation Y Original IP packet dest Y Step 1. Original, unroutable IP Packet sent to router Step 2 Original IP packet encapsulated in another IP packet Original IP packet New IP Packet Tunnel Step 3 Original packet extracted, sent to destination Original IP packet dest Y Tunnel
Types of Tunnels (with thanks to Bernard Aboba) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Voluntary Tunnels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Voluntary L2TP Tunnel
Compulsory Tunnels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compulsory Tunnels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Compulsory L2TP Tunnel
RADIUS Support for Tunnels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RADIUS Dial Up Security ,[object Object],User Login Private Network Authenticates dial in users at boundary of private network RADIUS Protocol Boundary ,[object Object],RADIUS Server RAS
Protocol Comparison PPTP L2TP IPSEC Authenticated Tunnels   X   X Compression   X   X   X Smart Cards    X   X Address Allocation   X   X Multiprotocol    X   X Encryption        X Flow Control      X Requires Server   X   X
Layer 2 Tunneling Protocol (L2TP) Mobile Employee Shared Dial Network L2TP Tunnel Private Network LAC Telecommuter LAC LNS RADIUS L2TP Access Concentrator (LAC) tunnels PPP frames in IP PPP L2TP Network Server de-tunnels PPP, authenticates via RADIUS and performs address assignment

Weitere ähnliche Inhalte

Was ist angesagt?

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 

Was ist angesagt? (20)

Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Vpn
VpnVpn
Vpn
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Mpls based vpn connectivity
Mpls based vpn connectivityMpls based vpn connectivity
Mpls based vpn connectivity
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN
VPNVPN
VPN
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 

Andere mochten auch (6)

Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
What Is VPN
What Is VPNWhat Is VPN
What Is VPN
 
Vpn
VpnVpn
Vpn
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 

Ähnlich wie 4 vpn s

12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
Israel Marcus
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 

Ähnlich wie 4 vpn s (20)

Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
V P N
V P NV P N
V P N
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Vpn intro by dongshuzhao
Vpn intro by dongshuzhaoVpn intro by dongshuzhao
Vpn intro by dongshuzhao
 
F0322038042
F0322038042F0322038042
F0322038042
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Vpn
Vpn Vpn
Vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Firewall
FirewallFirewall
Firewall
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 

Mehr von Swarup Kumar Mall (18)

Vp ns
Vp nsVp ns
Vp ns
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn 3 13_07
Vpn 3 13_07Vpn 3 13_07
Vpn 3 13_07
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn 2
Vpn 2Vpn 2
Vpn 2
 
Vpn
VpnVpn
Vpn
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156
Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156
Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156
 
D l table
D l tableD l table
D l table
 
Cheap vpn
Cheap vpnCheap vpn
Cheap vpn
 
Btech. 1st year_new_syllabus_final__2008_bput_
Btech. 1st year_new_syllabus_final__2008_bput_Btech. 1st year_new_syllabus_final__2008_bput_
Btech. 1st year_new_syllabus_final__2008_bput_
 
Blug talk
Blug talkBlug talk
Blug talk
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
2008 cse
2008 cse2008 cse
2008 cse
 
2008 cse copy
2008 cse   copy2008 cse   copy
2008 cse copy
 
VPN
VPNVPN
VPN
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

4 vpn s

  • 1.
  • 2. Defining Some Terms Intranet Internal corporate applications using Web and Internet technology Extranet Extends an Intranet to include customers, suppliers and partners Remote Access Uses the Internet to link telecommuters and mobile workers to the company Intranet
  • 3.
  • 4.
  • 5. One way to communicate… Router CSU/DSU LAN LAN Firewall LAN Web Sites Los Angeles HQ New York Boston CSU/DSU Router Firewall CSU/DSU Router PSTN Remote Access Server Internet CSU/DSU Firewall Remote Access Server
  • 6. Another view of network possibilities... A Virtual Private Network Internet Router VSU-1000 CSU/DSU LAN LAN Firewall LAN Web Sites Los Angeles New York Boston Remote Clients (VPNremote) CSU/DSU VSU-1000 Router Firewall CSU/DSU VSU-1000 Router VPNmanager VSU-1000
  • 7. Tunneling Illustrated Router A Workstation X Router B Workstation Y Original IP packet dest Y Step 1. Original, unroutable IP Packet sent to router Step 2 Original IP packet encapsulated in another IP packet Original IP packet New IP Packet Tunnel Step 3 Original packet extracted, sent to destination Original IP packet dest Y Tunnel
  • 8.
  • 9.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16. Protocol Comparison PPTP L2TP IPSEC Authenticated Tunnels X X Compression X X X Smart Cards X X Address Allocation X X Multiprotocol X X Encryption X Flow Control X Requires Server X X
  • 17. Layer 2 Tunneling Protocol (L2TP) Mobile Employee Shared Dial Network L2TP Tunnel Private Network LAC Telecommuter LAC LNS RADIUS L2TP Access Concentrator (LAC) tunnels PPP frames in IP PPP L2TP Network Server de-tunnels PPP, authenticates via RADIUS and performs address assignment

Hinweis der Redaktion

  1. Tunneling is the network layer 3 technology that is used to route otherwise unroutable packets. Packets that have had some security function performed on them, such as encryption, can’t be routed, because their packet headers have been changed. In the case of encryption, the packet is no longer readable to routers. In the case of other types of security, the packet header is changed to provide security such as authentication.
  2. This is an example of the way many, if not most, networks are constructed today. We have a headquarters site located in Los Angeles. Branch offices in New York and Boston connect to the HQ with leased T1 lines. Remote clients dialing into the network do so by calling into a remote access server in Los Angeles or New York. Things to note: The company is paying for the leased T1 lines by the mile. (Think about how far it is from Los Angeles to New York and Los Angeles to Boston.) The company must install new modems, remote access servers, and dial-in analog lines (or PRI lines for ISDN/Analog combinations) constantly to meet the needs of a growing, more mobile workforce. How long do you think it would take to add a new office in New Jersey to this network? How about a new office in Tokyo? How much would these cost for hardware, installation, and monthly leased line fees? How likely is it that a small two-person office would be added to this network? Although there are firewalls shown in this network, not all security requirements are being met. How would you add new business partners or customers to this network? Because of these issues and questions, there are opportunities to evolve this paradigm to include some new communications options!
  3. This illustration shows a packet generated by workstation X on a LAN on the left, which is to be sent over the Internet to workstation Y on the right. Hypothetically, this packet isn’t routable over the Internet for some reason (for example, because of illegal addressing). Workstation X forwards its packet to Router A to be routed across the Internet. Router A then encapsulates the original packet in a routable packet, which it then sends over the Internet. A tunnel consists of these encapsulated packets traversing a public network like the Internet. Router B on the right receives the packet, then strips off the encapsulating packet header that was used for routing across the Internet. This yields the original packet, which it then forwards to Workstation Y.
  4. PPTP, as a “voluntary” tunneling model, on the other hand, allows end-systems (e.g. desktop computers) to configure and establish individual discrete point-to-point tunnels to arbitrarily located PPTP servers, without the intermediate NAS participating in the PPTP negotiation and tunnel establishment. In this scenario, a dial-in subscriber dials into a NAS, however, the PPP session is terminated on the NAS as in the traditional PPP model. The subsequent PPTP session is then established between the client end-system and any arbitrary upstream PPTP server that the client desires to connect to, given that it can reached via traditional routing information, and that the user has been granted the appropriate privileges on the PPTP server [Figure 9].
  5. L2TP, as a “compulsory” tunneling model, is essentially a mechanism to “off load” a dial-up subscriber to another point in the network, or to another network altogether. In this scenario, a dial-up subscriber dials into a NAS (Network Access Server), and based on a locally configured profile (or a NAS negotiation with a policy server) and successful authentication, a L2TP tunnel is dynamically established to a predetermined end-point, where the subscriber’s PPP session is terminated [Figure 8].
  6. RADIUS protects the boundary of the private network at the point in which outsiders connect to it via dial-up networking. The username and password and possibly other security elements are used to authenticate the outsider to see if they are allowed to cross the boundary into the private network.
  7. L2TP is the “standards track” effort to combine L2F and PPTP. It lacks everything that the proprietary protocols lack in terms of security and flexibility. Since both PPTP and L2F camps have invested so much marketing and sales efforts in their proprietary versions, and L2TP can be promised as a “standards based upgrade path”, not much effort is going into L2TP at this point. When you boil layer two forwarding protocols such as PPTP, L2F, or L2TP, they have no security, no flexibility, and apparently no interoperability. They aren’t good for VPNs for this reason, so what are they good for? They’re ideally designed for carrying multiple protocols such as IP, IPX, Appletalk, Decnet, etc. across the Internet in IP packets. However, most VPN customers will be IP centric, so its highly questionable whether these protocols will have any real utility at all. They’re basically marketing technologies--not real standards based solutions.