19
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

Embed Size (px)

Citation preview

Page 1: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

1

Virtual Private Network (VPN)

• Course: COSC513

• Instructor: Professor M. Anvari

• Student: Xinguang Wang

Page 2: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

2

Content

• Introduction

• VPN Technologies

• VPN Products

• Advantages and Disadvantages of VPN

• Conclusion

Page 3: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

3

Public vs Private Network

• Public Network• Accessible freely to everyone, no

boundaries and few rules to manage it.• Problem of security• Ideal medium for illegal activity

Page 4: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

4

Public vs Private Network

• Private network• Owned by a single corporation• Gateway routers exist between private

network and public network• Firewall prevents intruders coming from

public network

Page 5: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

5

Limit to Private Network

• Separate branches or offices

• Need for remote access

• Traditional method—using leased lines, not flexible and expensive

Page 6: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

6

Solution: Virtual Private Network (VPN)

• Definition: a way to simulate a private network over a public network (Internet)

• Allow creation of a secure, private network over a public network such as the Internet

• Done through IPSec (IP Security Protocol), encryption, packet tunneling, and firewalls

Page 7: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

7

Functions provided by VPN

• Authentication: ensuring that the data originates at the source that it claims

• access control: restricting unauthorized users from gaining admission to the network

• Confidentiality: preventing anyone from reading or copying data as it travels across the Internet

• data integrity: ensuring that no one tampers with data as it travels across the Internet

Page 8: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

8

An Important property of VPN

• Virtual means dynamic—Network formed logically, no permanent links. When connection no longer needed the links is torn down—bandwidth saved.

Page 9: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

9

How to create tunnels

• A tunnel is a virtual connection between locations that are connected in a VPN

• Host A generates an IP packet with the destination address of Host B

• The packet is routed to a firewall or secure router at the boundary of A’s network.

• The firewall filters all packets to determine the need for IPSec processing.

Page 10: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

10

How to create a tunnel(cont)

• The packet is now routed to B’s firewall

• After detected the packet is delivered to B

Page 11: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

11

IP Security Protocols (IPSec)

• IPSec is a protocol suitea set of IP extensions that provide security services at the network level. IPSec technology is based on modern cryptographic technologies, making very strong data authentication and privacy guarantees possible.

Page 12: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

12

IPSec functions

• Three facilities provided by IPSec• Authentication-only

• Authentication/encryption

• Key exchange

Page 13: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

13

Other protocols for VPN

• Point to point tunnel protocol (PPTP)

• Layer-2 forwarding (L2F)

• Layer-2 tunneling protocol (L2TP)

Page 14: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

14

VPN Products

• Hardware-based system• Encrypting routers

• Secure and easy to use

• Not flexible

• Firewall-based system• Using farewall’s security system

• Restrict the access to the internal network

• Performance not as good as hard-ware based

Page 15: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

15

VPN Product (cont)

• Software-based system, ideal when• Both ends not controlled by the same corp.

• Different firewalls and routers implemented within the same system

• Harder to manage than encrypting routers

Page 16: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

16

Advantages of VPN

• Lower cost

• Remote access

• Platform independent

• Can be used both as extranet and intranet

Page 17: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

17

Disadvantages of VPN

• Lower bandwidth available compared to dial-in line

• Inconsistent remote access performance due to changes in Internet connectivity

• No entrance into the network if the Internet connection is broken

Page 18: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

18

Conclusion

• The driving force for VPN is the requirement to make more secure information communication and to decrease the communication cost

• IPSec is the mostly used protocols for VPN

Page 19: 1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang

19

References

• 1.   Virtual private networks: making the right connection, Dennis Fowler, San

Francisco, CA, Morgan Kaufmann Publishers, 1999;

• 2.  http://kubarb.phsx.ukans.edu/~third/vpn.html;

• 3.    http://www.vpnc.rog;

• 4.    http://www.vpncon.com;

• 5.    http://www.iec.org/turtorials/vpn/;