27
VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras

VPN: Virtual Private Network

Embed Size (px)

DESCRIPTION

VPN: Virtual Private Network. Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras. Outline. Introductions What is it? Overview Security/Tunneling Advantages and Disadvantages Demonstration. Introductions. Gregg BSG – Student Developer - PowerPoint PPT Presentation

Citation preview

Page 1: VPN:  Virtual Private Network

VPN: Virtual Private Network

Presented By:Gregg Dowdy

Liz Farricker

Whitney Mayoras

Page 2: VPN:  Virtual Private Network

Outline

Introductions What is it? Overview Security/Tunneling Advantages and Disadvantages Demonstration

Page 3: VPN:  Virtual Private Network

Introductions

Gregg BSG – Student Developer Unified Western Grocers – Retail Technology

Specialist Liz

BSG – Business Analyst ResNet – Network Technician COB CRC: Tier 2/3 Support Technician

Whitney BSG – Student Tester/Analyst

Page 4: VPN:  Virtual Private Network

VPN: What is it?

Virtual Private Network Remote network communication through

Internet Used by companies/organizations who want

to communicate confidentially Two parts:

Protected or “inside” network “Outside” network or segment (less trustworthy)

Page 5: VPN:  Virtual Private Network

VPN: Types

Secure VPNs use cryptographic tunneling protocols. IPsec, SSL/TLS, OpenVPN, PPTP, L2TP,

L2TPv3, VPN-Q and MPVPN Trusted VPNs rely on the security of a

single provider’s network to protect the traffic. MPLS and L2F

Page 6: VPN:  Virtual Private Network

VPN: Security

Encryption IPSec Authentication

User/System and Data AAA Servers

(Authentication, Authorization, and Accounting)

Firewalls

Page 7: VPN:  Virtual Private Network

VPN: Tunneling

Requires 3 protocols Carrier

Default network protocol Passenger

Original data Encapsulation

GRE, IPSec, L2F, PPTP, L2TP

Page 8: VPN:  Virtual Private Network

VPN: Encapsulation

Figure 1

Page 9: VPN:  Virtual Private Network

VPN: Tunneling (cont.)

Two Basic types of tunneling Site-to-Site

Typically uses GRE Remote-Access

Typically uses PPP

Page 10: VPN:  Virtual Private Network

VPN: Advantages

Cost Effective Greater scalability Easy to add/remove users Mobility Security

Page 11: VPN:  Virtual Private Network

VPN: Disadvantages

Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products

from different vendors

Page 12: VPN:  Virtual Private Network

VPN Demonstration

Click on Start – select Network Connections

Page 13: VPN:  Virtual Private Network

VPN Demonstration

In Network Connections on the left hand side there is a link to “Create New Connection” – click on this and a wizard will pop up assisting the user

Page 14: VPN:  Virtual Private Network

VPN Demonstration

Select “Connect to the Network at my Workplace”

Page 15: VPN:  Virtual Private Network

VPN Demonstration

Select “Virtual Private Network Connection”

Page 16: VPN:  Virtual Private Network

VPN Demonstration

Make a name for this connection that you are establishing – to distinguish this connection from other VPN connections that might already be established

Page 17: VPN:  Virtual Private Network

VPN Demonstration

For this demonstration I am trying to connect to my wireless router off campus therefore the IP address that I insert is the IP address for my router which I can find out by running an ipconfig and it is the IP address for your default gateway

NOTE: Not all routers will allow users to VPN into it

Page 18: VPN:  Virtual Private Network

VPN Demonstration

Personal preference as to whether or not you want other users to be able to use this VPN connection on this computer

Page 19: VPN:  Virtual Private Network

VPN Demonstration

Page 20: VPN:  Virtual Private Network

VPN Demonstration

Page 21: VPN:  Virtual Private Network

VPN Demonstration

This is a profile (username and password) that has already been created on your router – which can be created by typing in the IP address of your router in a web browser

Page 22: VPN:  Virtual Private Network

VPN Demonstration

Page 23: VPN:  Virtual Private Network

VPN Demonstration

In Start – Run insert the IP address of the computer that you want to access that is connected to the router

Page 24: VPN:  Virtual Private Network

VPN Demonstration

Using the same username and password already established for the router you can connect to this specific computer

Page 25: VPN:  Virtual Private Network

VPN Demonstration

These are only the files that are “shared” on this computer

Page 26: VPN:  Virtual Private Network

How to Connect to OSU:

How to connect to OSU: Dave Sullivan made a helpful Tutorial First on the Engineering Website you have to download

the Cisco VPN Client One must acquire authorization information prior to

using the VPN service Once registration is complete you download the

appropriate client depending on your operating system; and follow the steps to complete the connection

Page 27: VPN:  Virtual Private Network

References

[Figure 1] <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>

Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.

Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>.

"Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.