SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
TECHNOLOGY BEHIND VPN




        Sovello Hildebrand Mgani
     IT Consultant - FUGIT Consult
                Tanzania
      sovellohpmgani@gmail.com
Outline:

   Design:
     security gateways, security policy servers and
      certificate authorities.
   Implementation options:
       VPN appliances (integrated [firewalls and routers] &
        standalone)
       VPN Servers
       Managed Service: (AT&T, WorldCom, Quest, etc.)
   Security: IPSec, L2F, L2TP, PPTP
Design:
   Basic questions to ask before embarking onto VPN
       How many users are at each site?
        What are the bandwidth requirements for each needed
        connection?
       Does the connection need to be permanent or on-demand
        (dial-up)?
       How much traffic will the site generate?
       Are there times when traffic is higher than others?
       What are the service-level requirements?
       Are there any problems existing in your company that will be
        solved by the implementation of a VPN?
       Why is a VPN better than the next competing alternative?
       Should the VPN be outsourced or built in-house?
Design: ...

   Besides the internet there are three other important
    pieces for a VPN:
       security gateways: to provide security against
        unauthorized access to the information on the inside.
        Include: routers, firewalls, VPN hardware and or
        software
       security policy servers: contain the access-
        information list, to dictate what and who to allow and
        disallow access the resources.
       certificate authorities: for key verification. It could be a
        database for example. An outsourced one is the best
        option.
Implementation Options:

   VPN Appliances:
       Integrated appliances: come embedded in routers or
        firewalls.
                   Reduced costs.
       Standalone: Concentrators, have to be bought on their
        own.
   VPN Servers: come in as software (Oss). Consider
    the hassle of managing the operating system and
    the network itself.
   Managed Service: Outsourcing. AT&T,
    WorldCom, etc.
Security

   Requirements to transfer data via VPN:
       Integrity
       Tamper-resistance
       Protection from duplication by unauthorized parties
       Confidentiality: from source to destination.
Security: Protocols
   These requirements are met through tunnelling
    protocols as described here:
       PPTP: uses Point to Point Protocol. PPP packets are
        encapsulated by using a modified version of GRE
        (Generic Routing Encapsulation) Protocol. which allows
        other protocols to be utilized by PPTP e.g. IPX and
        NetBEUI.
       L2F: works by encapsulation of PPP packets within IP
        Packets.
       L2TP: this combines the best of both PPTP and L2F
Security: Protocols
   IPSec: originally developed to plug the security
    inadequacies of IPv4 in the next generation of IP
    protocols, Ipv6 as Ipv4 was developed without
    consideration on security.
       IPSec can be used by two methods: tunnel mode and
        transport mode,
       This is possible because of the ability to separate
        authentication and encryption application to each
        packet.
       In transport mode, the transport layer is the only
        segment that is authenticated or encrypted.
       Tunnel mode authenticates or encrypts the entire
        packet, providing even more protection against
        unauthorized access, interception, or attack.

Contenu connexe

Tendances

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpnAreeba Gill
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 

Tendances (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
V P N
V P NV P N
V P N
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 

En vedette

What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?Frederik Questier
 
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011One Laptop per Pacific Child
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Frederik Questier
 
New learning paradigms and educational technologies
New learning paradigms and educational technologiesNew learning paradigms and educational technologies
New learning paradigms and educational technologiesFrederik Questier
 
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Sovello Hildebrand
 
Technologies For Higher Education
Technologies For Higher EducationTechnologies For Higher Education
Technologies For Higher EducationFrederik Questier
 
JTELSS13 Why is free software important in education
JTELSS13 Why is free software important in educationJTELSS13 Why is free software important in education
JTELSS13 Why is free software important in educationEdmund Laugasson
 
Use of songs, raps, poems
Use of songs, raps, poemsUse of songs, raps, poems
Use of songs, raps, poemsmworth
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Frederik Questier
 
FLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software IndustryFLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software IndustryFrederik Questier
 
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011One Laptop per Pacific Child
 
Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...Frederik Questier
 
Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Frederik Questier
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyBlack Duck by Synopsys
 
New learning paradigms and technologies
New learning paradigms and technologiesNew learning paradigms and technologies
New learning paradigms and technologiesFrederik Questier
 
Include it all. Filter it afterward.
Include it all. Filter it afterward.Include it all. Filter it afterward.
Include it all. Filter it afterward.Mark Baker
 
ERP Software Why its good
ERP Software Why its goodERP Software Why its good
ERP Software Why its goodcrmowbray
 
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Frederik Questier
 

En vedette (20)

FLOSS & OER
FLOSS & OERFLOSS & OER
FLOSS & OER
 
What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?
 
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...
 
New learning paradigms and educational technologies
New learning paradigms and educational technologiesNew learning paradigms and educational technologies
New learning paradigms and educational technologies
 
Templanza
TemplanzaTemplanza
Templanza
 
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
 
Technologies For Higher Education
Technologies For Higher EducationTechnologies For Higher Education
Technologies For Higher Education
 
JTELSS13 Why is free software important in education
JTELSS13 Why is free software important in educationJTELSS13 Why is free software important in education
JTELSS13 Why is free software important in education
 
Use of songs, raps, poems
Use of songs, raps, poemsUse of songs, raps, poems
Use of songs, raps, poems
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...
 
FLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software IndustryFLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software Industry
 
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011
 
Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...
 
Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
 
New learning paradigms and technologies
New learning paradigms and technologiesNew learning paradigms and technologies
New learning paradigms and technologies
 
Include it all. Filter it afterward.
Include it all. Filter it afterward.Include it all. Filter it afterward.
Include it all. Filter it afterward.
 
ERP Software Why its good
ERP Software Why its goodERP Software Why its good
ERP Software Why its good
 
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
 

Similaire à What Technology Lies Behind VPN

Similaire à What Technology Lies Behind VPN (20)

Vpn
VpnVpn
Vpn
 
Vpn
VpnVpn
Vpn
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Stay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfStay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdf
 
Vpn
Vpn Vpn
Vpn
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Firewalls
FirewallsFirewalls
Firewalls
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
VPN
VPN VPN
VPN
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

What Technology Lies Behind VPN

  • 1. TECHNOLOGY BEHIND VPN Sovello Hildebrand Mgani IT Consultant - FUGIT Consult Tanzania sovellohpmgani@gmail.com
  • 2. Outline:  Design:  security gateways, security policy servers and certificate authorities.  Implementation options:  VPN appliances (integrated [firewalls and routers] & standalone)  VPN Servers  Managed Service: (AT&T, WorldCom, Quest, etc.)  Security: IPSec, L2F, L2TP, PPTP
  • 3. Design:  Basic questions to ask before embarking onto VPN  How many users are at each site?  What are the bandwidth requirements for each needed connection?  Does the connection need to be permanent or on-demand (dial-up)?  How much traffic will the site generate?  Are there times when traffic is higher than others?  What are the service-level requirements?  Are there any problems existing in your company that will be solved by the implementation of a VPN?  Why is a VPN better than the next competing alternative?  Should the VPN be outsourced or built in-house?
  • 4. Design: ...  Besides the internet there are three other important pieces for a VPN:  security gateways: to provide security against unauthorized access to the information on the inside. Include: routers, firewalls, VPN hardware and or software  security policy servers: contain the access- information list, to dictate what and who to allow and disallow access the resources.  certificate authorities: for key verification. It could be a database for example. An outsourced one is the best option.
  • 5. Implementation Options:  VPN Appliances:  Integrated appliances: come embedded in routers or firewalls.  Reduced costs.  Standalone: Concentrators, have to be bought on their own.  VPN Servers: come in as software (Oss). Consider the hassle of managing the operating system and the network itself.  Managed Service: Outsourcing. AT&T, WorldCom, etc.
  • 6. Security  Requirements to transfer data via VPN:  Integrity  Tamper-resistance  Protection from duplication by unauthorized parties  Confidentiality: from source to destination.
  • 7. Security: Protocols  These requirements are met through tunnelling protocols as described here:  PPTP: uses Point to Point Protocol. PPP packets are encapsulated by using a modified version of GRE (Generic Routing Encapsulation) Protocol. which allows other protocols to be utilized by PPTP e.g. IPX and NetBEUI.  L2F: works by encapsulation of PPP packets within IP Packets.  L2TP: this combines the best of both PPTP and L2F
  • 8. Security: Protocols  IPSec: originally developed to plug the security inadequacies of IPv4 in the next generation of IP protocols, Ipv6 as Ipv4 was developed without consideration on security.  IPSec can be used by two methods: tunnel mode and transport mode,  This is possible because of the ability to separate authentication and encryption application to each packet.  In transport mode, the transport layer is the only segment that is authenticated or encrypted.  Tunnel mode authenticates or encrypts the entire packet, providing even more protection against unauthorized access, interception, or attack.