SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
The Virtual Private
Network
A quick
overview
What	 is	 the	 Virtual	 Private	 
Network?
VPN is termed as the connectivity, deployed on a Shared
Infrastructure with the same policies and ‘Performance’ as
a private Network.
© 2000, Cisco Systems, Inc.
2400
1190_05_2000_c2
Main
Office
Home
Office
POP
Mobile
Worker
Business
Partner
Remote
Office
Regional
Office
Connectivity Deployed on a Shared
Infrastructure with the Same Policies and
‘Performance’ as a Private Network
Virtual Private
Network
A virtual private network can be contrasted with an
expensive system of owned or leased lines that can
only be used by one organisation.
The goal of a VPN is to provide the organisation with
the same capabilities, but at a much lower cost.
A VPN works by using the shared public
infrastructure while maintaining privacy through
security procedures and tunnelling protocols.
In effect, the protocols, by encrypting data at the
sending end and decrypting it at the receiving end,
send the data through a “tunnel” that cannot be
“entered” by data that is not properly generated.
An additional level of security involves encrypting not
only the data, but also the originating and receiving
network addresses.
How does the VPN works?
Types of VPN
Intranet VPN
Extends the connectionless IP model across a shared WAN

—> Reduces application development time

—> Reduces support costs

—>Reduces line costs 13© 2000, Cisco Systems, Inc.
2400
1190_05_2000_c2
Main
Office
Remote
Office
Remote
Office
Service Provider
POP
POP
POP
Internet/
IP VPNs
VPN Types: Intranet VPNVPN Types: Intranet VPN
• Extends the connectionless
IP model across a shared WAN
Reduces application development time
Reduces support costs
Reduces line costs
Extranet VPN
Extends connectivity to suppliers, customers, and business partners.
Over a shared infrastructures.
Using dedicated connections
While ensuring proper level of authorised access
14© 2000, Cisco Systems, Inc.
2400
1190_05_2000_c2
Service Provider
Business
Partner
Supplier
Customer
Main
Office
POPPOP
POPPOP
POPPOP
Remote
Office
Remote
Office
VPN Types: Extranet VPNVPN Types: Extranet VPN
• Extend connectivity to suppliers, customers, and business partners
• Over a shared infrastructure
• Using dedicated connections
• While ensuring proper level of authorized access
Internet/
IP VPNs
Router/Firewall initiated VPN
For site to site connectivity - internets and extranets.
POP
Internet
Remote Router or Firewall Initiated
POP
IPSec
Encrypted
Tunnel
Router/Firewall-Initiated VPNRouter/Firewall-Initiated VPN
Benefits of VPN
Extend geographic connectivity
Improve security
Reduce operational costs versus traditional WAN.
Reduce transit time and transportation cost for remote users.
Improve Productivity
Simplify network
Provides global networking opportunities
Easy to configure
Provide telecommuter support
Used to access BLOCKED websites
VPN Security
A well-designed VPN uses several
methods for keeping your connection
and data secure:
Fire walls
Encryption
Sec
AAA server
VPN uses encryption to provide the data confidentiality.
Once connected, the VPN makes use of the tunnelling
mechanism to encapsulate encrypted data into a secure
tunnel, with openly read headers, which can cross the
public networks.
VPN also provides the data integrity check.This is typically
performed using a message digest to ensure that the data
has not been tampered with during transmission.
VPN Security
Firewalls
Provides a strong barrier
between your private
network and the internet.
You can set firewalls to
restrict the numbers of
ports, what types of
packets are passed
through and which
protocols are allowed
through.
Encryption
Process of taking all the
data that one computer
is sending to another
and encoding it into a
form that only the other
computer will be able to
decode.
IPSec
Internet Protocol
Security Protocol (IPSec)
provides enhanced
security features such as
better encryption
algorithms and more
comprehensive
authentication.
Creating Dial up VPN on
windows server 2008R2
Conditions:

>IP address should be static

>firewall should be turned off

> computers must be in a network

>domain should be built already
Go to server manager, install the RRAS
role from the Administrative tools.
Follow the onscreen instructions with a
desired choice of options as according
you want to build the VPN.
Risks and Limitations
Hacking Attacks
VPN Hijacking is the unauthorised take-over of an
established VPN connection from a remote client, and
impersonating that client on the connecting network.
Man-in-Middle attacks affect traffic being sent between
communicating parties , and can include interception,
insertion, deletion, and modification of messages,
reflecting messages back at the sender, repaying old
messages and redirecting messages.
User Authentication
By default, VPN does not provide/enforce strong user
authentication. A VPN connection should only be
established by an authenticated user. If the
authentication is not strong enough to restrict
unauthorised access, an unauthorised party could
access the connected network and its resources. Most
VPN implementations provide limited authentications
methods. For example, PAP, used in PPTP, transports
both username and password in clear text. A third party
could capture this information and use it to gain
subsequent access to the network.
Client-Side risks
The VPN client machines of, say, home users may be
connected to the Internet via a standard broadband
connection while at the same time holding a VPN connection
to a private network, using split tunnelling. This may pose a
risk to the private network being connected to.
A client machine may also be shared with other parties who
are not fully aware of the security implications. In addition, a
laptop used by a mobile user may be connected to the
Internet, a wireless LAN at a hotel, airport or on other foreign
networks. However, the security protection in most of these
public connection points is inadequate for VPN access. If the
VPN client machine is compromised, either before or during
the connection, this poses a risk to the connecting network.
Virus/ Malware Infections
A connecting network can be compromised if the client
side is infected with a virus. If a virus or spyware
infects a client machine, there is chance that the
password for the VPN connection might be leaked to
an attacker. In the case of an intranet or extranet VPN
connection, if one network is infected by a virus or
worm, that virus / worm can be spread quickly to other
networks if anti-virus protection systems are ineffective.
Conclusion
VPN provides a means of accessing a secure, private,
internal network over insecure public networks such as
the Internet. A number of VPN technologies have been
outlined, among which IPsec and SSL VPN are the
most common. Although a secure communication
channel can be opened and tunnelled through an
insecure network via VPN, client side security should
not be overlooked.
–Abhinav Dwivedi
“Thank You”
Made by Apple Keynote

Mais conteúdo relacionado

Mais procurados

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 

Mais procurados (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn security
Vpn security Vpn security
Vpn security
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Firewall
Firewall Firewall
Firewall
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
VPN
VPNVPN
VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

Destaque

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 

Destaque (12)

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Vpn 3 13_07
Vpn 3 13_07Vpn 3 13_07
Vpn 3 13_07
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private network
 

Semelhante a The Virtual Private Network

IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
SonuSingh81247
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 

Semelhante a The Virtual Private Network (20)

Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
vpn
vpnvpn
vpn
 
Vpn
VpnVpn
Vpn
 

Último

In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
HyderabadDolls
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
HyderabadDolls
 

Último (20)

In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime GiridihGiridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
 

The Virtual Private Network

  • 2. What is the Virtual Private Network? VPN is termed as the connectivity, deployed on a Shared Infrastructure with the same policies and ‘Performance’ as a private Network. © 2000, Cisco Systems, Inc. 2400 1190_05_2000_c2 Main Office Home Office POP Mobile Worker Business Partner Remote Office Regional Office Connectivity Deployed on a Shared Infrastructure with the Same Policies and ‘Performance’ as a Private Network Virtual Private Network
  • 3. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organisation. The goal of a VPN is to provide the organisation with the same capabilities, but at a much lower cost.
  • 4. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunnelling protocols. In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a “tunnel” that cannot be “entered” by data that is not properly generated. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.
  • 5. How does the VPN works?
  • 6.
  • 8. Intranet VPN Extends the connectionless IP model across a shared WAN
 —> Reduces application development time
 —> Reduces support costs
 —>Reduces line costs 13© 2000, Cisco Systems, Inc. 2400 1190_05_2000_c2 Main Office Remote Office Remote Office Service Provider POP POP POP Internet/ IP VPNs VPN Types: Intranet VPNVPN Types: Intranet VPN • Extends the connectionless IP model across a shared WAN Reduces application development time Reduces support costs Reduces line costs
  • 9. Extranet VPN Extends connectivity to suppliers, customers, and business partners. Over a shared infrastructures. Using dedicated connections While ensuring proper level of authorised access 14© 2000, Cisco Systems, Inc. 2400 1190_05_2000_c2 Service Provider Business Partner Supplier Customer Main Office POPPOP POPPOP POPPOP Remote Office Remote Office VPN Types: Extranet VPNVPN Types: Extranet VPN • Extend connectivity to suppliers, customers, and business partners • Over a shared infrastructure • Using dedicated connections • While ensuring proper level of authorized access Internet/ IP VPNs
  • 10. Router/Firewall initiated VPN For site to site connectivity - internets and extranets. POP Internet Remote Router or Firewall Initiated POP IPSec Encrypted Tunnel Router/Firewall-Initiated VPNRouter/Firewall-Initiated VPN
  • 11.
  • 12. Benefits of VPN Extend geographic connectivity Improve security Reduce operational costs versus traditional WAN. Reduce transit time and transportation cost for remote users. Improve Productivity Simplify network Provides global networking opportunities Easy to configure Provide telecommuter support Used to access BLOCKED websites
  • 13.
  • 15. A well-designed VPN uses several methods for keeping your connection and data secure: Fire walls Encryption Sec AAA server
  • 16. VPN uses encryption to provide the data confidentiality. Once connected, the VPN makes use of the tunnelling mechanism to encapsulate encrypted data into a secure tunnel, with openly read headers, which can cross the public networks. VPN also provides the data integrity check.This is typically performed using a message digest to ensure that the data has not been tampered with during transmission. VPN Security
  • 17. Firewalls Provides a strong barrier between your private network and the internet. You can set firewalls to restrict the numbers of ports, what types of packets are passed through and which protocols are allowed through.
  • 18. Encryption Process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode.
  • 19. IPSec Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication.
  • 20. Creating Dial up VPN on windows server 2008R2 Conditions:
 >IP address should be static
 >firewall should be turned off
 > computers must be in a network
 >domain should be built already Go to server manager, install the RRAS role from the Administrative tools. Follow the onscreen instructions with a desired choice of options as according you want to build the VPN.
  • 22. Hacking Attacks VPN Hijacking is the unauthorised take-over of an established VPN connection from a remote client, and impersonating that client on the connecting network. Man-in-Middle attacks affect traffic being sent between communicating parties , and can include interception, insertion, deletion, and modification of messages, reflecting messages back at the sender, repaying old messages and redirecting messages.
  • 23. User Authentication By default, VPN does not provide/enforce strong user authentication. A VPN connection should only be established by an authenticated user. If the authentication is not strong enough to restrict unauthorised access, an unauthorised party could access the connected network and its resources. Most VPN implementations provide limited authentications methods. For example, PAP, used in PPTP, transports both username and password in clear text. A third party could capture this information and use it to gain subsequent access to the network.
  • 24. Client-Side risks The VPN client machines of, say, home users may be connected to the Internet via a standard broadband connection while at the same time holding a VPN connection to a private network, using split tunnelling. This may pose a risk to the private network being connected to. A client machine may also be shared with other parties who are not fully aware of the security implications. In addition, a laptop used by a mobile user may be connected to the Internet, a wireless LAN at a hotel, airport or on other foreign networks. However, the security protection in most of these public connection points is inadequate for VPN access. If the VPN client machine is compromised, either before or during the connection, this poses a risk to the connecting network.
  • 25. Virus/ Malware Infections A connecting network can be compromised if the client side is infected with a virus. If a virus or spyware infects a client machine, there is chance that the password for the VPN connection might be leaked to an attacker. In the case of an intranet or extranet VPN connection, if one network is infected by a virus or worm, that virus / worm can be spread quickly to other networks if anti-virus protection systems are ineffective.
  • 26. Conclusion VPN provides a means of accessing a secure, private, internal network over insecure public networks such as the Internet. A number of VPN technologies have been outlined, among which IPsec and SSL VPN are the most common. Although a secure communication channel can be opened and tunnelled through an insecure network via VPN, client side security should not be overlooked.