SlideShare uma empresa Scribd logo
1 de 52
VIRTUAL PRIVATE
   NETWORK


        By:
     Tammy Be
     Khoa Kieu
    Stephen Tran
    Michael Tse
VPN Introduction
• Virtual private networking (VPN) in Microsoft
  Windows 2000 allows mobile users to connect
  over the Internet to a remote network.
• With virtual private networking, the user calls the
  local ISP and then uses the Internet to make the
  connection to the Network Access Server (NAS).
• Users only make a local call to the ISP instead of
  expensive long distance telephone calls to the
  remote access server.
How VPN Works
• ISA Server is configured as a VPN Server
• The local ISA VPN computer connects to its ISP
• The remote VPN wizard runs on the ISA Server
  on the remote network
• The remote ISA Server VPN computer connects to
  its ISP
• When a computer on the local network
  communicates with a computer on the remote
  network, data is encapsulated and sent through the
  VPN tunnel
Main Modules


• System Requirement
• VPN Requirement
• Microsoft Layer 2 Tunneling Protocols
• Cables/Service for Internet Connection
• How to Install and Enable VPN
• How to Configure the VPN Server
  (Configure the Remote Access Server as a Router)
• How to Configure the VPN Client
Module


System Requirement
System Requirement

• Microsoft Windows 2000, Server
• Microsoft Windows 2000, Professional
END OF SYSTEM
REQUIREMENT MODULE
Module


VPN Requirement
VPN Requirement

•   User Authentication
•   Address Management
•   Data Encryption
•   Multi-Protocol Support
•   Access Management
User Authentication
• The solution must identify the user’s identity and
  only allow access to authorized users.
• The user account can be a local account on the
  VPN server or, in most cases, a domain account
  granted appropriate dial-in permissions.
• The default policy for remote access is “Allowed
  access if dial-in permission is enabled.”
Address Management
• VPN must assign the client an IP address on the
  private network
• The VPN server can assign the clients IP address
  using DHCP or a static pool of IP addresses
• Clients typically will have an IP address from the
  ISP and an IP on the private network after the
  VPN connection is established
Data Encryption
• Data sent and received over the Internet must be
  encrypted for privacy
• PPTP and L2TP use PPP-based data encryption
  methods
• Optionally you can use Microsoft Point-to-Point
  Encryption (MPPE), based on the RSA RCA
  algorithm
• Microsoft Implementation of the L2TP protocol
  uses IPSec encryption to protect the data stream
  form the client to the tunnel server.
Multi-Protocol Support

• Microsoft Layer 2 Tunneling Protocol
  supports multiple payload protocols, which
  makes it easy for tunneling clients to access
  their corporate networks using IP, IPX, and
  NetBUI.
Access Management
• Manage addresses and name server
  – VPN must have IP address available to assign
    to VPN client during the IP Control Protocol
    (IPCP) negotiation phase of the connection
    process.
  – The IP address assigned to the VPN client is
    assigned to virtual interface of the VPN client.
• Manage access by user account
• Manage access by group membership
END OF VPN REQUIRMENT
       MODULE
Module


Microsoft Layer 2 Tunneling
         Protocols
Microsoft Layer 2 Tunneling Protocols

• PPTP – Point-to-Point Tunneling Protocol
  – Uses a TCP connection for tunnel maintenance and
    generic routing encapsulated PPP frames for
    tunneled data.
  – The payloads of the encapsulated PPP frames can be
    encrypted and/or compressed.
• L2TP – Layer 2 Tunneling Protocol
  – Uses UDP and a series of L2TP messages for tunnel
    maintenance.
END OF MICROSOFT LAYER 2
    TUNNELING PROTOCOL
Module


Cables/Service for Internet
       Connection
Cables/service for Internet
                       Connection
• Should use a dedicated line such as T-1, Fractional T-
  1, or Frame Relay.
    – T-1: a dedicated phone connection supporting data
      rates of 1.544Mbits per second, consists of 24
      individual channels, each supports 64Kbits per
      second.
    – Fractional T-1: One or more channels of a T-1
      services, less bandwidth, and less expensive.
    – Frame Relay: ( a way of utilizing existing T-1 and
      T-3 lines owned by a service provider), a packet-
      switching protocol for connecting devices on a
      WAN.
END OF CABLES/SERVICE
FOR INTERNET CONNECTION
        MODULE
Module


How to Install and Enable VPN
Install and Enable VPN

• VPN is automatically installed when one
  installs Windows 2000
INTERNET CONNECTION NEDDED (DSL)
       CAN LEASE T-1 LINE
   COMPANY WILL PROVIDE REAL
           IP ADDRESS
END OF HOW TO INSTALL
AND ENABLE VPN MODULE
Module


How to Configure the VPN Server
How to Configure the VPN Server
 (Configure the Remote Access Server as a Router) :
                                           Preview

• Allow remote access server to forward traffic
  properly in side network.
• Allow other locations in the intranet to be reached
  from the remote access.
• Configure as router with static route or routing
  protocols.
Steps for Configuring Remote
         Access Server as a Router

   start                Administrative Tools



 Click Routing & Remote Access          Right-click Server Name


                               On General tap
 Click Properties        Click Enable This Computer
                                 As a Router

      Select either LAN routing                Ok
only or LAN and demand dial routing
END OF HOW TO CONFIGURE
  THE VPN SERVER MODULE
Module


How to Configure the VPN Client
END OF HOW TO CONFIGURE
      A VPN CLIENT
Summary

• VPN must assign the client an IP address on
  the private network
• Microsoft Implementation of the L2TP
  protocol uses IPSec encryption to protect
  the data stream form the client to the tunnel
  server
Web Reference

• For more information on VPN, visit
  www.Microsoft.com
  – Keyword “VPN”
Glossary
• Virtual Private Network (VPN)- a network that
  is constructed by using public wires to connect
  nodes.
• Tunneling- A technology that enables one
  network to send its data via another network's
  connections.
• Point-to-Point Tunneling Protocol (PPTP)- is
  used to ensure that messages transmitted from one
  VPN node to another are secure.
• Layer Two Tunneling Protocol (L2TP)-
  Provides data encryption, authentication, and
  integrity and IPSec.
END OF VPN PROJECT

Mais conteúdo relacionado

Mais procurados

CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikDobri Boyadzhiev
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterKHNOG
 
Chapter 1 Networking
Chapter 1 NetworkingChapter 1 Networking
Chapter 1 Networkingmlrbrown
 
Vpn setup guide
Vpn setup guideVpn setup guide
Vpn setup guideAClarida
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2Waqas Ahmed Nawaz
 
F5 Link controller Configuration
F5 Link controller Configuration F5 Link controller Configuration
F5 Link controller Configuration PCCW GLOBAL
 
CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network MonitoringNetworkel
 
Whitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best PracticesWhitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best PracticesEric Wong
 
F5 link controller
F5  link controllerF5  link controller
F5 link controllerJimmy Saigon
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to pointNetworkel
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6Waqas Ahmed Nawaz
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Servermmoizuddin
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 

Mais procurados (20)

CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
 
Mikrotik advanced
Mikrotik advancedMikrotik advanced
Mikrotik advanced
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
 
Chapter 1 Networking
Chapter 1 NetworkingChapter 1 Networking
Chapter 1 Networking
 
Vpn setup guide
Vpn setup guideVpn setup guide
Vpn setup guide
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
F5 Link controller Configuration
F5 Link controller Configuration F5 Link controller Configuration
F5 Link controller Configuration
 
CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
 
Vlan
Vlan Vlan
Vlan
 
BRAC case study on mikrotik router for NGO network
BRAC case study on mikrotik router for NGO networkBRAC case study on mikrotik router for NGO network
BRAC case study on mikrotik router for NGO network
 
Whitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best PracticesWhitepaper: Peplink Hybrid WAN Best Practices
Whitepaper: Peplink Hybrid WAN Best Practices
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
F5 link controller
F5  link controllerF5  link controller
F5 link controller
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 

Semelhante a Configure and Set Up a VPN Network

VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar reportSKS
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxLeahRachael
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinChiradeep Vittal
 
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...nvirters
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydneyMiguel Lavalle
 
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_201304090314557256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455ytrui
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 

Semelhante a Configure and Set Up a VPN Network (20)

Unit07
Unit07Unit07
Unit07
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
V P N
V P NV P N
V P N
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...
Tech Talk by John Casey (CTO) CPLANE_NETWORKS : High Performance OpenStack Ne...
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
Routed networks sydney
Routed networks sydneyRouted networks sydney
Routed networks sydney
 
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_201304090314557256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 

Configure and Set Up a VPN Network

  • 1. VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse
  • 2. VPN Introduction • Virtual private networking (VPN) in Microsoft Windows 2000 allows mobile users to connect over the Internet to a remote network. • With virtual private networking, the user calls the local ISP and then uses the Internet to make the connection to the Network Access Server (NAS). • Users only make a local call to the ISP instead of expensive long distance telephone calls to the remote access server.
  • 3. How VPN Works • ISA Server is configured as a VPN Server • The local ISA VPN computer connects to its ISP • The remote VPN wizard runs on the ISA Server on the remote network • The remote ISA Server VPN computer connects to its ISP • When a computer on the local network communicates with a computer on the remote network, data is encapsulated and sent through the VPN tunnel
  • 4.
  • 5. Main Modules • System Requirement • VPN Requirement • Microsoft Layer 2 Tunneling Protocols • Cables/Service for Internet Connection • How to Install and Enable VPN • How to Configure the VPN Server (Configure the Remote Access Server as a Router) • How to Configure the VPN Client
  • 7. System Requirement • Microsoft Windows 2000, Server • Microsoft Windows 2000, Professional
  • 10. VPN Requirement • User Authentication • Address Management • Data Encryption • Multi-Protocol Support • Access Management
  • 11. User Authentication • The solution must identify the user’s identity and only allow access to authorized users. • The user account can be a local account on the VPN server or, in most cases, a domain account granted appropriate dial-in permissions. • The default policy for remote access is “Allowed access if dial-in permission is enabled.”
  • 12. Address Management • VPN must assign the client an IP address on the private network • The VPN server can assign the clients IP address using DHCP or a static pool of IP addresses • Clients typically will have an IP address from the ISP and an IP on the private network after the VPN connection is established
  • 13. Data Encryption • Data sent and received over the Internet must be encrypted for privacy • PPTP and L2TP use PPP-based data encryption methods • Optionally you can use Microsoft Point-to-Point Encryption (MPPE), based on the RSA RCA algorithm • Microsoft Implementation of the L2TP protocol uses IPSec encryption to protect the data stream form the client to the tunnel server.
  • 14. Multi-Protocol Support • Microsoft Layer 2 Tunneling Protocol supports multiple payload protocols, which makes it easy for tunneling clients to access their corporate networks using IP, IPX, and NetBUI.
  • 15. Access Management • Manage addresses and name server – VPN must have IP address available to assign to VPN client during the IP Control Protocol (IPCP) negotiation phase of the connection process. – The IP address assigned to the VPN client is assigned to virtual interface of the VPN client. • Manage access by user account • Manage access by group membership
  • 16. END OF VPN REQUIRMENT MODULE
  • 17. Module Microsoft Layer 2 Tunneling Protocols
  • 18. Microsoft Layer 2 Tunneling Protocols • PPTP – Point-to-Point Tunneling Protocol – Uses a TCP connection for tunnel maintenance and generic routing encapsulated PPP frames for tunneled data. – The payloads of the encapsulated PPP frames can be encrypted and/or compressed. • L2TP – Layer 2 Tunneling Protocol – Uses UDP and a series of L2TP messages for tunnel maintenance.
  • 19. END OF MICROSOFT LAYER 2 TUNNELING PROTOCOL
  • 21. Cables/service for Internet Connection • Should use a dedicated line such as T-1, Fractional T- 1, or Frame Relay. – T-1: a dedicated phone connection supporting data rates of 1.544Mbits per second, consists of 24 individual channels, each supports 64Kbits per second. – Fractional T-1: One or more channels of a T-1 services, less bandwidth, and less expensive. – Frame Relay: ( a way of utilizing existing T-1 and T-3 lines owned by a service provider), a packet- switching protocol for connecting devices on a WAN.
  • 22. END OF CABLES/SERVICE FOR INTERNET CONNECTION MODULE
  • 23. Module How to Install and Enable VPN
  • 24. Install and Enable VPN • VPN is automatically installed when one installs Windows 2000
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. INTERNET CONNECTION NEDDED (DSL) CAN LEASE T-1 LINE COMPANY WILL PROVIDE REAL IP ADDRESS
  • 31.
  • 32.
  • 33.
  • 34. END OF HOW TO INSTALL AND ENABLE VPN MODULE
  • 35. Module How to Configure the VPN Server
  • 36. How to Configure the VPN Server (Configure the Remote Access Server as a Router) : Preview • Allow remote access server to forward traffic properly in side network. • Allow other locations in the intranet to be reached from the remote access. • Configure as router with static route or routing protocols.
  • 37. Steps for Configuring Remote Access Server as a Router start Administrative Tools Click Routing & Remote Access Right-click Server Name On General tap Click Properties Click Enable This Computer As a Router Select either LAN routing Ok only or LAN and demand dial routing
  • 38. END OF HOW TO CONFIGURE THE VPN SERVER MODULE
  • 39. Module How to Configure the VPN Client
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. END OF HOW TO CONFIGURE A VPN CLIENT
  • 49. Summary • VPN must assign the client an IP address on the private network • Microsoft Implementation of the L2TP protocol uses IPSec encryption to protect the data stream form the client to the tunnel server
  • 50. Web Reference • For more information on VPN, visit www.Microsoft.com – Keyword “VPN”
  • 51. Glossary • Virtual Private Network (VPN)- a network that is constructed by using public wires to connect nodes. • Tunneling- A technology that enables one network to send its data via another network's connections. • Point-to-Point Tunneling Protocol (PPTP)- is used to ensure that messages transmitted from one VPN node to another are secure. • Layer Two Tunneling Protocol (L2TP)- Provides data encryption, authentication, and integrity and IPSec.
  • 52. END OF VPN PROJECT