Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 17

VPN: Basics

Traditional Remote
Access
Remote Locations

Leased Lines Corporate


Headquarters

Customers, Suppliers
& Consultants
Remote Users Modem Bank
A New Solution: VPN
Virtual Private Networking
Allowing cost effective expansion of private and secure networks

Telecommuters &
Mobile Users
Corporate
Internet Headquarters

Remote Locations

Customers, Suppliers
& Consultants
How does VPN work?
1. Connect to the Internet.

2. Attempt to access remote private network.

3. Initiate Secure Connection to remote


VPN gateway.
Internet
4. Authenticate Connection.

5. VPN Tunnel is complete

Intranet

Database
Tunneling
Sending Data Through the VPN Tunnel

Intranet Server

Secure VPN Tunnel

A tunnel establishes a secure connection between two


private networks over a public medium like the Internet.
Why is VPN the Best
Solution?
VPN allows businesses and users to securely access remote
LAN resources without the added cost of dedicated leased lines.

 Security.

 Encryption.

 Reliability.

 Flexible working hours.

 Scalable infrastructure.

 Save on long distance phone charges.


VPN: Terms to Know
 IPSec

Internet Protocol Security (IPSec) is an industry


standard enabling secure communications over the
Internet.
Secure
Interoperable
Industry Standard
IPSec is implemented by:

IPSec VPN
VPN: Terms to Know
 Security Association

A Security Association is the group of settings that


allow communication between VPN devices and/or
VPN client software.
Security Associations define VPN settings such as
encryption, destination network, security association
name, and pre-shared secret.
VPN: Terms to Know
 Authentication in VPN is determining if the remote VPN user is
who or what it is declared to be.

 The use of Digital Certificates for VPN is considered a


strong authentication mechanism.

 Digital Certificates are maintained


and issued using a Public Key
Infrastructure (PKI).

Digital
VPN Applications
Corporate LAN

VPN Client Software

Mobile Users

Corporate LAN

SonicWALL TELE2
Telecommuter

Corporate LAN

SonicWALL SOHO2 /50


Remote Locations
Example of packet encapsulation
VPN Components: Security

• Encryption
– Technique for scrambling and unscrambling
information
– Unscramble – called clear-text
– Scrambled information – cipher-text
VPN Components: Security
• Keys
– Secret code that the encryption algorithm uses to
create a unique version of cipher-text
– 8-bits keys = 256 combinations or two to the eighth
power
– 16-bits keys = 65,536 combinations or two to the 16th
power
– 56-bits keys = 72,057,594,037,927,900 or two to the
56th power
– 168-bits keys …
VPN Components: Security

• Authentication
– Determine if the sender is the authorized
person and if the data has been redirect or
corrupted
– User/System Authentication
– Data Authentication
VPN
Corporate
Headquarters

Remote User

Internet Atlanta

Bangalore

Remote Location

Delhi
CONCLUSION
Any questions?

You might also like