Upload
habibullah-adel
View
74
Download
0
Embed Size (px)
Citation preview
Islamic Republic of AfghanistanMinistry of Higher Education
Balkh UniversityFaculty of Computer Science
Department of Software Engineering
Mohammad Wafa Junior Teaching Assistant Department of Software Engineering Balkh university
prepared by:Habibullah Adel
4th year final semester
Department of Software EngineeringBalkh University
Impelementation VPN On Endian Firewall
Supervisor:
Way to Protect Information
Content
• Introduction• Problem Statement • Method of Solutions• Type of VPN• VPN Tunneling Protocols• Advantage and Disadvantage of VPN• Conclusion• Reference
What is VPN ?1. Vritual private Network extends a private network
across a public network , such as the Internet.2. A virtual private network (VPN) is a technology that
creates an encrypted connection over a less secure network.
3. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Why Have VPNs?
Problem Statement
Data Communication problems between LANs. Not ability to share information in the same LAN from
derffernt locations. Cost and Time Consuming for connecting of two or
more LANs . Lack of professional instructors in IT center.
Method of Solutions
I used searching and implementaion methodes for my project. First I got the problem and then I create a solution for It .
The methode which I choose to get the solution for this probelm is the impelemnetaion of VPN on Endian firewall .
VPN is simple and easy way to control from every where to log in and control the network by remote acces.
2 Type of VPN
Remote-Access VPN The two types of remote access VPNs are SSL and IPsec.
Site-to-Site VPN Intranet based-Extranet based
VPN Tunneling protocols
Transport mode Tunnel mode IPsec can be used in protecting data flows between
(host to host) and (Nework to Nework) tunnels often use passwords or digital Certificates. or Beween (Network to host).
IPsec (Internet protocol security)
VPN Tunneling protocols
An OSI L2P protocols built on top of the ppp (point-to-point protocol) .
PPP is a dial-up protocol used to connect to the Internet. Remote user can access a private network via PPTP by first dialing into their local ISP.
PPTP (Point-to-point Tunneling Protocol)
VPN Tunneling protocols
SSL (Point-to-point Tunneling Protocol) Encrypt everything above the Transport Layer. Uses certificates for authentication. Always uses the strongest encryption that both the
server and client support.
Advantage of VPN
Cost Effective remote access control Easy to add/remove users Mobility Security
Disadvantages of VPN
Difficult to accommodate products from different vendors
Inconsistent remote access performance due to changes in Internet connectivity.
No entrance into the network if the Internet connection is broken.
Administrating and infrastructure of VPN services can be relatively expensive.
Unpredictable Internet traffic
Conclusion
Security remote access control Protocols –IPsec-pptp-ssl
Resource:
www.vpnc.org/vpn-technologies.pdf www.cisco.com/ipsec_wp.htm www.computerworld.com www.findvpn.com www.adtran.com/
THANK YOU…..!!