17
Islamic Republic of Afghanistan Ministry of Higher Education Balkh University Faculty of Computer Science Department of Software Engineering Mohammad Wafa Junior Teaching Assistant Department of Software Engineering Balkh university prepared by: Habibullah Adel 4th year final semester Department of Software Engineering Balkh University Impelementation VPN On Endian Firewall Supervisor:

Vpn virtual private network

Embed Size (px)

Citation preview

Page 1: Vpn virtual private network

Islamic Republic of AfghanistanMinistry of Higher Education

Balkh UniversityFaculty of Computer Science

Department of Software Engineering

Mohammad Wafa Junior Teaching Assistant Department of Software Engineering Balkh university

prepared by:Habibullah Adel

4th year final semester

Department of Software EngineeringBalkh University

Impelementation VPN On Endian Firewall

Supervisor:

Page 2: Vpn virtual private network
Page 3: Vpn virtual private network

Way to Protect Information

Page 4: Vpn virtual private network

Content

• Introduction• Problem Statement • Method of Solutions• Type of VPN• VPN Tunneling Protocols• Advantage and Disadvantage of VPN• Conclusion• Reference

Page 5: Vpn virtual private network

What is VPN ?1. Vritual private Network extends a private network

across a public network , such as the Internet.2. A virtual private network (VPN) is a technology that

creates an encrypted connection over a less secure network.

3. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Page 6: Vpn virtual private network

Why Have VPNs?

Page 7: Vpn virtual private network

Problem Statement

Data Communication problems between LANs. Not ability to share information in the same LAN from

derffernt locations. Cost and Time Consuming for connecting of two or

more LANs . Lack of professional instructors in IT center.

Page 8: Vpn virtual private network

Method of Solutions

I used searching and implementaion methodes for my project. First I got the problem and then I create a solution for It .

The methode which I choose to get the solution for this probelm is the impelemnetaion of VPN on Endian firewall .

VPN is simple and easy way to control from every where to log in and control the network by remote acces.

Page 9: Vpn virtual private network

2 Type of VPN

Remote-Access VPN The two types of remote access VPNs are SSL and IPsec.

Site-to-Site VPN Intranet based-Extranet based

Page 10: Vpn virtual private network

VPN Tunneling protocols

Transport mode Tunnel mode IPsec can be used in protecting data flows between

(host to host) and (Nework to Nework) tunnels often use passwords or digital Certificates. or Beween (Network to host).

IPsec (Internet protocol security)

Page 11: Vpn virtual private network

VPN Tunneling protocols

An OSI L2P protocols built on top of the ppp (point-to-point protocol) .

PPP is a dial-up protocol used to connect to the Internet. Remote user can access a private network via PPTP by first dialing into their local ISP.

PPTP (Point-to-point Tunneling Protocol)

Page 12: Vpn virtual private network

VPN Tunneling protocols

SSL (Point-to-point Tunneling Protocol) Encrypt everything above the Transport Layer. Uses certificates for authentication. Always uses the strongest encryption that both the

server and client support.

Page 13: Vpn virtual private network

Advantage of VPN

Cost Effective remote access control Easy to add/remove users Mobility Security

Page 14: Vpn virtual private network

Disadvantages of VPN

Difficult to accommodate products from different vendors

Inconsistent remote access performance due to changes in Internet connectivity.

No entrance into the network if the Internet connection is broken.

Administrating and infrastructure of VPN services can be relatively expensive.

Unpredictable Internet traffic

Page 15: Vpn virtual private network

Conclusion

Security remote access control Protocols –IPsec-pptp-ssl

Page 16: Vpn virtual private network

Resource:

www.vpnc.org/vpn-technologies.pdf www.cisco.com/ipsec_wp.htm www.computerworld.com www.findvpn.com www.adtran.com/

Page 17: Vpn virtual private network

THANK YOU…..!!