15

Site to Site VPN Using TMG Firewall. University Final Presentation

Embed Size (px)

Citation preview

Page 1: Site to Site VPN Using TMG Firewall. University Final Presentation
Page 2: Site to Site VPN Using TMG Firewall. University Final Presentation

Muhammad Rafiq khan Roll: 07

Page 3: Site to Site VPN Using TMG Firewall. University Final Presentation

Table Of Contents What is a Firewall? VPN Introduction-What is VPN and who uses it? Types of VPN’s VPN topology How it works VPN Protocols VPN Advantages TMG Introduction Summary/Conclusion

Page 4: Site to Site VPN Using TMG Firewall. University Final Presentation

What is a Firewall? A firewall is a device which is standing between

two networks and allow authorized traffic that one satisfies the rule and policies of firewall.

OR A firewall is basically a gateway all incoming and

outgoing traffic must pass through it and as it is stated it will allow only authorized traffic.

By authorized traffic we mean the traffic that satisfies the policy of firewall.

Page 5: Site to Site VPN Using TMG Firewall. University Final Presentation

Types of FirewallHardware Based Firewall: Those firewalls which can

be physically touchable. These firewalls are most commonly used in the world of networking to make

the local network secure. For Example: ASA (Adaptive Security Appliance) in brief it is Cisco

security deviceSoftware Based Firewall: These firewalls are in software from or these are applications that configured on systems and do the job of firewall. For Example: Windows firewall, ISA,TMG.

Page 6: Site to Site VPN Using TMG Firewall. University Final Presentation

What is a VPN? A Virtual Private Network (VPN) extends a

private network across a public network, such as the Internet.

In simple words virtual private network is used to access private network from public network in a secure way.

Large corporation educational institutions and Government Agencies use VPN Technology to enable remote user to securely connect to a Private Network.

Page 7: Site to Site VPN Using TMG Firewall. University Final Presentation

Who uses VPN’s?

VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available.

VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet

Page 8: Site to Site VPN Using TMG Firewall. University Final Presentation

Types of VPN Remote-Access VPN

Site-to-Site VPN

Page 9: Site to Site VPN Using TMG Firewall. University Final Presentation

Remote-Access VPN Remote-access, also called a Virtual Private

dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.

Remote-access is used for connecting an individual computer to a network.

A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field.

Page 10: Site to Site VPN Using TMG Firewall. University Final Presentation

Site-to-Site VPN Site-to-Site VPN allows employees in

geographically disparate offices to share one related virtual network. A VPN can also be used to interconnect two similar networks over a dissimilar middle networks, In this type of VPN a tunnel is created between to TMG as VPN servers and the both private network can access each other through internet by creation of virtual tunnel. All traffic is passed from this virtual tunnel.

Page 11: Site to Site VPN Using TMG Firewall. University Final Presentation

VPN Protocol Point-to-point tunneling protocol (PPTP)

PPTP is widely supported by Microsoft as it is built into the various flavors of the Windows OS

PPTP initially had weak security features, however, Microsoft continues to improve its support

Page 12: Site to Site VPN Using TMG Firewall. University Final Presentation

Advantages of VPN’s The main advantage of

VPN’s, is cost savings. VPN’s lower costs by

eliminating the need for expensive long-distance leased lines. A local leased line or even a broadband connection is all that’s needed to connect to the Internet and utilize the public network to securely tunnel a private connection.

Page 13: Site to Site VPN Using TMG Firewall. University Final Presentation

TMG (Threat Management Gateway) Microsoft Threat Management Gateway (TMG) is

a software base firewall which can blocks all kind of traffic on network environment. TMG is a network security and protection for Microsoft Operation System .TMG is a software base firewall that can allows and denied the services to the TMG client’s machine.

Microsoft Threat Management Gateway (TMG), formerly known as Microsoft Internet Security and Acceleration server (ISA Server). Microsoft TMG is a firewall application which inspect network traffic (including web services, web content, secure web content and emails).

Page 14: Site to Site VPN Using TMG Firewall. University Final Presentation

Requirements for TMG System with (dual core,core 2 duo, Quad

core,core i3,etc) processor to support TMG. System with at least 2GB Ram on which TMG is going

to be installed. The System must have atleast 2 NIC cards. The system must support the below operating systems.

Windows server 2008 sp2 64 Bits. Windows server 2008 R2 64 Bits.

Web services Routing and Remote Access Services

Page 15: Site to Site VPN Using TMG Firewall. University Final Presentation

The EndThank you all for your time.