Ngày tải lên: 07/04/2014, 15:38
Virtual Private Network (VPN)
... SUMMARY VPNs do not make use of dedicated leased lines VPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secure VPN components VPN servers VPN clients Protocols 39 TUNNELING PROTOCOLS Layer 2 Tunneling Protocol (L2TP) Provides better security through IPSec IPSec enables L2TP to perform Authentication Encapsulation Encryption 18 TUNNELING PROTOCOLS Secure Shell (SSH) Provides authentication and encryption Works with UNIXbased systems Versions for Windows are also available Uses publickey cryptography Socks V. 5 Provides proxy services for applications That do not usually support proxying Socks version 5 adds encrypted authentication and support for UDP 20 16 ENCRYPTION SCHEMES USED BY VPNS (CONTINUED) Secure Sockets Layer (SSL) (continued) Steps Server uses its private key to decode premaster code Generates a master secret key Client and server use it to generate session keys Server and client exchange messages saying handshake is completed SSL session begins 34 SUMMARY (CONTINUED) VPN types Sitetosite Clienttosite Encapsulation encloses one packet within another Conceals the original information VPN protocols Secure Shell (SSH) Socks version 5 PointtoPoint Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) 40 Virtual Private Network (VPN) 29 BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION) Các buớc trong tiến trình VPN Đóng gói (Encapsulation) Mã hoá (Encryption) Xác thực (Authentication) Encapsulation Đóng gói dữ liệu và các thông số khác nhau Ví dụ như IP header Bảo vệ tính nguyên vẹn dữ liệu 15 31 27 VPN CORE ACTIVITY 2: ENCRYPTION Encryption Process of rendering information unreadable by all but the intended recipient Components Key Digital certificate Certification Authority (CA) Key exchange methods Symmetric cryptography Asymmetric cryptography Internet Key Exchange FWZ 28 12 SUMMARY (CONTINUED) IPSec/IKE Encryption makes the contents of the packet unreadable Authentication ensures participating computers are authorized users Kerberos: strong authentication system VPN advantages High level of security at low cost VPN disadvantages Can introduce serious security risks 41 24 10 25 5 ENCRYPTION SCHEMES USED BY VPNS Triple Data Encryption Standard (3DES) Used by many VPN hardware and software 3DES is a variation on Data Encryption Standard (DES) DES is not secure 3DES is more secure Three separate 64bit keys to process data 3DES requires more computer resources than DES 30 WHY ESTABLISH A VPN? VPN combinations Combining VPN hardware with software adds layers of network security One useful combination is a VPN bundled with a firewall VPNs do not eliminate the need for firewalls Provide flexibility and versatility 13 FIREWALL CONFIGURATION FOR VPNS 37 Protocol ... SUMMARY VPNs do not make use of dedicated leased lines VPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secure VPN components VPN servers VPN clients Protocols 39 TUNNELING PROTOCOLS Layer 2 Tunneling Protocol (L2TP) Provides better security through IPSec IPSec enables L2TP to perform Authentication Encapsulation Encryption 18 TUNNELING PROTOCOLS Secure Shell (SSH) Provides authentication and encryption Works with UNIXbased systems Versions for Windows are also available Uses publickey cryptography Socks V. 5 Provides proxy services for applications That do not usually support proxying Socks version 5 adds encrypted authentication and support for UDP 20 16 ENCRYPTION SCHEMES USED BY VPNS (CONTINUED) Secure Sockets Layer (SSL) (continued) Steps Server uses its private key to decode premaster code Generates a master secret key Client and server use it to generate session keys Server and client exchange messages saying handshake is completed SSL session begins 34 SUMMARY (CONTINUED) VPN types Sitetosite Clienttosite Encapsulation encloses one packet within another Conceals the original information VPN protocols Secure Shell (SSH) Socks version 5 PointtoPoint Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) 40 Virtual Private Network (VPN) 29 BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION) Các buớc trong tiến trình VPN Đóng gói (Encapsulation) Mã hoá (Encryption) Xác thực (Authentication) Encapsulation Đóng gói dữ liệu và các thông số khác nhau Ví dụ như IP header Bảo vệ tính nguyên vẹn dữ liệu 15 31 27 VPN CORE ACTIVITY 2: ENCRYPTION Encryption Process of rendering information unreadable by all but the intended recipient Components Key Digital certificate Certification Authority (CA) Key exchange methods Symmetric cryptography Asymmetric cryptography Internet Key Exchange FWZ 28 12 SUMMARY (CONTINUED) IPSec/IKE Encryption makes the contents of the packet unreadable Authentication ensures participating computers are authorized users Kerberos: strong authentication system VPN advantages High level of security at low cost VPN disadvantages Can introduce serious security risks 41 24 10 25 5 ENCRYPTION SCHEMES USED BY VPNS Triple Data Encryption Standard (3DES) Used by many VPN hardware and software 3DES is a variation on Data Encryption Standard (DES) DES is not secure 3DES is more secure Three separate 64bit keys to process data 3DES requires more computer resources than DES 30 WHY ESTABLISH A VPN? VPN combinations Combining VPN hardware with software adds layers of network security One useful combination is a VPN bundled with a firewall VPNs do not eliminate the need for firewalls Provide flexibility and versatility 13 FIREWALL CONFIGURATION FOR VPNS 37 Protocol ... SUMMARY VPNs do not make use of dedicated leased lines VPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secure VPN components VPN servers VPN clients Protocols 39 TUNNELING PROTOCOLS Layer 2 Tunneling Protocol (L2TP) Provides better security through IPSec IPSec enables L2TP to perform Authentication Encapsulation Encryption 18 TUNNELING PROTOCOLS Secure Shell (SSH) Provides authentication and encryption Works with UNIXbased systems Versions for Windows are also available Uses publickey cryptography Socks V. 5 Provides proxy services for applications That do not usually support proxying Socks version 5 adds encrypted authentication and support for UDP 20 16 ENCRYPTION SCHEMES USED BY VPNS (CONTINUED) Secure Sockets Layer (SSL) (continued) Steps Server uses its private key to decode premaster code Generates a master secret key Client and server use it to generate session keys Server and client exchange messages saying handshake is completed SSL session begins 34 SUMMARY (CONTINUED) VPN types Sitetosite Clienttosite Encapsulation encloses one packet within another Conceals the original information VPN protocols Secure Shell (SSH) Socks version 5 PointtoPoint Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) 40 Virtual Private Network (VPN) 29 BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION) Các buớc trong tiến trình VPN Đóng gói (Encapsulation) Mã hoá (Encryption) Xác thực (Authentication) Encapsulation Đóng gói dữ liệu và các thông số khác nhau Ví dụ như IP header Bảo vệ tính nguyên vẹn dữ liệu 15 31 27 VPN CORE ACTIVITY 2: ENCRYPTION Encryption Process of rendering information unreadable by all but the intended recipient Components Key Digital certificate Certification Authority (CA) Key exchange methods Symmetric cryptography Asymmetric cryptography Internet Key Exchange FWZ 28 12 SUMMARY (CONTINUED) IPSec/IKE Encryption makes the contents of the packet unreadable Authentication ensures participating computers are authorized users Kerberos: strong authentication system VPN advantages High level of security at low cost VPN disadvantages Can introduce serious security risks 41 24 10 25 5 ENCRYPTION SCHEMES USED BY VPNS Triple Data Encryption Standard (3DES) Used by many VPN hardware and software 3DES is a variation on Data Encryption Standard (DES) DES is not secure 3DES is more secure Three separate 64bit keys to process data 3DES requires more computer resources than DES 30 WHY ESTABLISH A VPN? VPN combinations Combining VPN hardware with software adds layers of network security One useful combination is a VPN bundled with a firewall VPNs do not eliminate the need for firewalls Provide flexibility and versatility 13 FIREWALL CONFIGURATION FOR VPNS 37 Protocol...
Ngày tải lên: 17/09/2012, 10:44
... - In LuËn v¨n, TiÓu luËn : 6.280.688 Lý thuyết. I. Tổng quan về mạng riêng ảo VPN (Virtual Private Network) . II. VPN và bảo mật internet VPN. III. Thiết kế VPN I. Tổng quan về mạng riêng ... tiết kiệm được chi phí và thời gian. VPN ra đời đáp ứng tất cả các yêu cầu trên Cụm từ Virtual Private Network gọi là mạng riêng ảo- VPN được khởi sự năm 1997. Mục đích mong muốn của công nghệ ... dịch nào dựa trên PPTP triển khai ít nhất 3 thành phần, các thành phần đó là : - PPTP client - Network Access Server (NAS) - PPTP server 23 CH sè 11 - B1 - §H KTQD Chuyªn Photocopy - §¸nh m¸y...
Ngày tải lên: 24/04/2013, 16:40
VIRTUAL PRIVATE NETWORK (VPN)
... tunnel về mạng của họ. I. Giới Thiệu VPN 1. Khái niệm - Mạng riêng ảo hay VPN (viết tắt cho Virtual Private Network) là một mạng dành riêng để kết nối các máy tính của các công ty, tập đoàn hay các ... lại đóng vai _________________________________________________________________________ VIRTUAL PRIVATE NETWORK (VPN) Nhóm 18 Lớp: DHTH3 GV: Th.s Nguyễn Hòa Danh sách: 1. Đặng Hồng Hải 2. Hồ Thanh ... cho mỗi vị trí một giao thức đặc trưng chỉ định trong gói IP header, tạo một đường kết nối ảo (virtual point- IV. Kết Luận - Hiện nay xu hướng các công ty có nhiều chi nhánh là phổ biến, do nhu cầu...
Ngày tải lên: 25/04/2013, 21:03
Virtual Private Networks
... services to keep your network safe. However, most modern VPN systems are combined with firewalls in a single device. Virtual Private Networking Explained Virtual Private Networks solve the problem ... connecting to a remote network via IPSec. This provides the hacker remote access to the private network, so he uses network scanning tools to "sniff out" the− structure of the network. He then ... passwords. The solution to this problem is Virtual Private Networks (VPNs). VPNs are a cost effective way to− extend your LAN over the Internet to remote networks and remote client computers. VPNs...
Ngày tải lên: 29/09/2013, 13:20
Virtual Private Networking in Windows 2000: An Overview
... public internetwork in a manner that emulates the properties of a point-to-point private link. The act of configuring and creating a virtual private network is known as virtual private networking. ... the internetwork appears to the user as a private network communication—despite the fact that this communication occurs over a public internetwork—hence the name virtual private network. VPN ... White Paper 19 USER ADMINISTRATION A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A VPN enables...
Ngày tải lên: 22/10/2013, 09:15
Thí nghiệm TTDL & Mạng máy tính - Bài 3: VPN (VIRTUAL PRIVATE NETWORK)
... Thí nghiệm TTDL & Mạng máy tính Trang 55 9. Nhấn Next. Trên trang Network Connection, chọn Virtual Private Network connection. 10. Nhấn Next. Trên trang Connection Name, gõ VPN Client ... TTDL & Mạng máy tính Trang 62 4. Trên trang Connection type chọn Connect using virtual private networking (VPN). 5. Nhấn Next. Trên trang VPN Type chọn Point-to-Point Tunneling Protocol ... phỏng & Truyền số liệu Thí nghiệm TTDL & Mạng máy tính Trang 49 BAØI 3 : VPN (VIRTUAL PRIVATE NETWORK) I. Lý thuyết chung cho VPN • VPN cung cấp kết nối mạng với khoảng cách dài. Về...
Ngày tải lên: 27/10/2013, 09:15
Virtual Private Networks
... number of terms are used widely in Secure VPN implementation, namely: •VPN. A private network configured within a public network, such as the Internet • VPN Tunnel. An exclusive channel or encrypted ... 545 Miscellaneous 546 Product.ini Parameters 549 Chapter 28 SSL Network Extender Introduction to the SSL Network Extender 554 How the SSL Network Extender Works 555 Commonly Used Concepts 556 Remote ... etc.). Overview 44 Figure 2-2 IKE Phase II Once the IPSec keys are created, bulk data transfer takes place: Virtual Private Networks Administration Guide Version NGX R65 701675 March 18, 2007 Table of Contents 5 Contents Preface...
Ngày tải lên: 06/11/2013, 00:15
Tài liệu 22.5. Virtual Private Networking pptx
... stolen.) Figure 22-5. You're on your way to joining the corporate network from thousands of miles away. Virtual private networking is ideal for the paranoid (because it's very secure) ... Network. Click the + button below the list of connections at the left side. The "Select an interface" sheet appears. 2. From the pop-up menu, choose VPN. 22.5. Virtual Private Networking ... cheap: the Virtual Private Networke, or VPN. Running a VPN allows you to create a super-secure "tunnel" from your Mac, across the Internet, and straight into your corporate network. ...
Ngày tải lên: 14/12/2013, 12:15
Tài liệu Cách thiết lập VPN (Virtual Private Networks) Client - Phần II pdf
... cho các học viên lớp MCSA - www.athenavn.com Cách thiết lập VPN (Virtual Private Networks) Client - Phần II Virtual Private Networks (VPN) hay gọi theo tiếng Việt là Mạng Riêng Ảo, cho phép ... ảnh minh họa 1. Right click vào My Network Places, chọn Properties, double click vào Make New Connection, sau đó click Next 2. Chọn vào Connect to private network through the Internet theo...
Ngày tải lên: 21/12/2013, 20:15
Tài liệu Virtual Private Networking doc
... +,6,2-2=." 1'. (/,6& VIRTUAL PRIVATE NETWORKING 01/24/14 8 " 01/24/14 31 Financial Plan High-level financial...
Ngày tải lên: 24/01/2014, 03:20
Tài liệu Configuring Virtual Private Networks pdf
... term virtual private dialup network (VPDN) instead of VPN. Enables VPN. Configuring Virtual Private Networks Verifying VPN Sessions DNC-176 Cisco IOS Dial Services Configuration Guide: Network ... 4500-M edge router Frame Relay data network Serial lines 4 TI PRI lines PSTN DNC-145 Cisco IOS Dial Services Configuration Guide: Network Services Configuring Virtual Private Networks This chapter describes ... both routers. Configuring Virtual Private Networks VPN Technology Overview DNC-152 Cisco IOS Dial Services Configuration Guide: Network Services Traditional dialup networking services only support...
Ngày tải lên: 24/01/2014, 10:20
Tài liệu Virtual Private Network (VPN) Implementation Options pptx
... model is deployed? mp900725.eps 87050021 07/15/00 steve gifford Virtual Networks Virtual Private Networks Virtual Dial-up Networks Virtual LANs Overlay VPN Peer-to-Peer VPN Layer 2 VPN Layer 3 ... 138 Chapter 8: Virtual Private Network (VPN) Implementation Options networks that are mostly IP-based, thus increasing the acquisition and operational costs of such a network. Peer-to-peer ... Jose Amsterdam Washington Atlanta Paris London Virtual circuits (Frame Relay DLCI) CH08 Page 149 Wednesday, February 19, 2003 4:23 PM 130 Chapter 8: Virtual Private Network (VPN) Implementation Options ...
Ngày tải lên: 24/01/2014, 19:20
Tài liệu Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs) ppt
... [Page 4] Network Working Group M. Behringer Request for Comments: 4381 Cisco Systems Inc Category: Informational February 2006 Analysis of the Security of BGP/MPLS IP Virtual Private Networks ... BGP/MPLS IP virtual private network (VPN) architecture that is described in RFC 4364, for the benefit of service providers and VPN users. The analysis shows that BGP/MPLS IP VPN networks can ... the network. Proper tools are required to configure the core network. o To minimise the risk of "internal" attacks, the core network must be properly secured. This includes network...
Ngày tải lên: 14/02/2014, 16:20
Tài liệu Virtual Private Networks doc
... of hubs • star of hubs Virtual Private Networks (VPNs) • Used to connect two private networks together via the Internet • Used to connect remote users to a private network via the Internet • This ... work together • make sure that remote clients software works with your firewall VPN • Virtual Private Networks CS-480b Dick Steflik ... security stuff to IP then this transport can be made more secure • Can be done two ways: • At the network level using IPSec • Currently the most widely used method – But requires special client...
Ngày tải lên: 17/02/2014, 14:20
Tài liệu Cách thiết lập VPN (Virtual Private Networks) Client potx
Ngày tải lên: 26/02/2014, 14:20
Tài liệu Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks doc
Ngày tải lên: 27/02/2014, 05:20