Professional Documents
Culture Documents
BUSINESS
Secured networks.
Abdusalam
Abdusalam
Two connections one is made to the Internet and the second is made
to the VPN.
Datagrams contains data, destination and source information.
Firewalls VPNs allow authorized users to pass through the firewalls.
Protocols protocols create the VPN tunnels.
VPN technology also allows a corporation to connect to branch offices
or to other companies over a public internetwork (such as the
Internet), while maintaining secure communications.
The VPN connection across the Internet logically operates as a wide
area network (WAN) link between the sites.
Abdusalam
3 types
Intranet Within an organization
Extranet Outside an organization
Remote Access Employee to Business
Abdusalam
Abdusalam
Abdusalam
Abdusalam
Abdusalam
10
Remote-Access VPN
Abdusalam
11
Remote-Access VPN:
Abdusalam
12
Site-to-Site VPN
Abdusalam
13
Site-to-Site VPN
Abdusalam
14
15
Whenever the host tries to send any traffic, the VPN client software
encapsulates and encrypts that traffic before sending it over the
Internet to the VPN gateway at the edge of the target network.
Upon receipt, that VPN gateway behaves as described above for siteto-site VPNs.
If the target host inside the private network returns a response, the
VPN gateway performs the reverse process to send an encrypted
response back to the VPN client over the Internet.
The most common secure tunneling protocol used in site-to-site VPNs
is the IPsec Encapsulating Security Payload (ESP), an extension to the
standard IP protocol used by the Internet and most corporate
networks today.
Abdusalam
16
Tunneling
17
Authentication validates that the data was sent from the sender.
Data Integrity ensuring that the data has not been altered
Abdusalam
18
Abdusalam
19
Abdusalam
20
21
Abdusalam
22
Abdusalam
23
VPN Requirements
24
VPN Requirements
Abdusalam
25
VPN Requirements
26
Abdusalam
27
Abdusalam
28