Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

3.1.4/3.1.5 Provision and use of VPNs

No description
by

michael brooke

on 9 May 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of 3.1.4/3.1.5 Provision and use of VPNs

Virtual Private Networks
Conclusion
Thank you for your attention!
VPNs are not always a force for good:

http://goo.gl/Dy8Rn
And one more thing...
Advantages
Security
Cost savings
Ease
Speed
Scalability
"A virtual private network (VPN) is a secure network that uses primarily public telecommunication infrastructures, such as the Internet, to provide remote offices or traveling users an access to a central organizational network." http://en.wikipedia.org/wiki/VPN
Secure
Definition
Types of VPN
Disadvantages
QoS management
Compatability
Hybrid
Trusted
All traffic on the VPN must be encrypted and authenticated. Traffic is sent along virtual tunnels
All traffic on the VPN relies on the security of a providers network to protect the traffic.
A combination of both secure and trusted technologies.
Site to site VPN
Remote Access VPN
Secure
VPN Technologies
Trusted
IPsec (IP security)
SSL
PPTP (point-to-point tunneling protocol)
L2TP (Layer 2 Tunnelling Protocol),
L2TPv3
ViPNet VPN (IP VPN)
ATM circuits
Frame relay circuits
MPLS
VPLS (VLAN)
A site to site VPN allows offices in different locations to connect securely over a public network such as the internet.
Each site is equipped with a VPN gateway such as a concentrator, router or firewall.
The VPN gateway is responsible for encapsulating and encrypting all outbound traffic and sending it through a VPN tunnel over the Internet to a peer VPN gateway at the target site. On receipt, the peer VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network.
Client software
Username
Password
In a Remote-access VPNs, clients, such as telecommuters, mobile users, and extranet consumers, are able to access a company network securely over the Internet. Each host typically has VPN client software loaded or uses a web-based client.
A remote-access VPN host or client typically has VPN client software. Whenever the host tries to send any information, the VPN client software encapsulates and encrypts the information before sending it over the Internet to the VPN gateway at the edge of the target network. On receipt, the VPN gateway handles the data in the same way as it would handle data from a site-to-site VPN.
Full transcript