Professional Documents
Culture Documents
UNIT 3
INDEX
2
WHAT IS VPN? Need Use of Tunneling with VPN Authentication Mechanisms Types of VPNs and their Usage Security Concerns in VPN
What is a VPN?
3
VPN is a network of virtual circuits that carries private traffic through public or shared networks such as the Internet or those provided by network service providers. VPN allows a trusted network to communicate with another trusted network over untrusted/ public networks like Internet. VPN are used to extend an enterprises internal private network across networks
What is a VPN?
4
Need/ Advantage
5
geographic connectivity Improves security Improves productivity Reduces transit time & transpiration costs Simplifies network topology Provides global networking opportunities Provides a broadband networking compatibility Provides a better ROI than a traditional WAN
Disadvantages
6
VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology
Tunneling
7
Tunneling is the process of placing an entire data packet within another packet (which provides the routing information) and sending it over the Internet. The path through which the packets travel is called a tunnel. For a tunnel to be established, both the tunnel client and the tunnel server must be using the same tunneling protocol A trusted VPN does not use cryptographic tunneling, instead it relies on the security of a
Tunneling
8
A virtual point-to-point connection made through a public network. It transports encapsulated datagrams.
Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area
Authentication Mechanism
10
A firewall sits remains between the remote users workstation and the server. As the client establish the communication with firewall, the client may pass authentication data to an authentication service inside the perimeter
Authentication Mechanism
11
For better security, VPN client can be configure to require that all the traffic must pass through the tunnel while VPN is active. Therefore, each employee would ensure that their data are kept safe and secure even if other computer in the network is infected
13
Security Concern
15