VPN: Virtual Private Network: Presented by

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 11

VPN:

Virtual Private Network

Presented By:
Wesam Shuldhum
ID: 202332483

Outline

What is it?
Types.
Security/Tunneling.
Advantages and Disadvantages.
Task 1 & Task 2

VPN: What is it?

Virtual Private Network


Remote network communication through
Internet
Used by companies/organizations who want
to communicate confidentially
Two parts:

Protected or inside network


Outside network or segment (less trustworthy)

VPN: Types

Secure VPNs use cryptographic


tunneling protocols.

IPsec, SSL/TLS, OpenVPN, PPTP, L2TP,


L2TPv3, VPN-Q and MPVPN

Trusted VPNs rely on the security of a


single providers network to protect the
traffic.

MPLS and L2F

VPN: Security

Encryption
IPSec
Authentication

User/System and Data


AAA Servers
(Authentication, Authorization, and Accounting)

Firewalls

VPN: Tunneling

Requires 3 protocols

Carrier

Passenger

Default network protocol


Original data

Encapsulation

GRE, IPSec, L2F, PPTP, L2TP

VPN: Tunneling (cont.)

Two Basic types of tunneling

Site-to-Site

Typically uses GRE

Remote-Access

Typically uses PPP

VPN: Advantages

Cost Effective
Greater scalability
Easy to add/remove users
Mobility
Security

VPN: Disadvantages

Understanding of security issues


Unpredictable Internet traffic
Difficult to accommodate products
from different vendors

Task 1
Configure IPsec VPN Settings

TIME: 20 minutes

Task 2
Verify Site-to-Site IPsec VPN
Configuration

TIME: 10 minutes

You might also like