Documente Academic
Documente Profesional
Documente Cultură
Traditional Connectivity
What is VPN?
Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations. Terminologies to understand how VPNs work.
What is a VPN
Public networks are used to move information between trusted network segments using shared facilities like frame relay or atm
A VIRTUAL Private Network replaces all of the above utilizing the public Internet Performance and availability depend on your ISP and the Internet
Why?
T1 is a 1.544 Mbps point-to-point dedicated, digital circuit provided by the telephone companies
Encryption
Encryption -- is a method of scrambling data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature for authentication
Tunneling
A virtual point-to-point connection made through a public network. It transports encapsulated datagrams.
Original Datagram Encrypted Inner Datagram
Datagram Header
Types of Implementations
What does implementation mean in VPNs? 3 types
Intranet Within an organization Extranet Outside an organization Remote Access Employee to Business
VPN Component
Tunneling Encryption Authentication,Identity Integrity, Prevent tampering
Tunneling
Tunnel dalam VPN sebenarnya hanya logical point-to-point connection dengan otentikasi dan enkripsi Paket lama dibungkus dalam paket baru. Alamat ujung tujuan terowongan (tunnel endpoints) diletakkan di destination address paket baru, yang disebut dengan encapsulation header. Tujuan akhir tetap ada pada header paket lama yang dibungkus (encapsulated). Saat sampai di endpoint, kapsul dibuka, dan paket lama dikirimkan ke tujuan akhirnya
Teknologi Tunneling
Protokol tunneling layer 2 (Data Link Layer) dan layer 3 (Network Layer) model OSI layer : Tunneling Layer 2 (Data Link Layer) :
PPTP (Point to Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) L2F (Layer 2 Forwarding)
4. 5. 6. 7.
2. 3. 4. 5.
IPSecurity (IPSec)
IPSec bekerja dengan tiga cara, yaitu: Network-to-network Host-to-network Host-to-host
Koneksi host-to-network, biasanya digunakan oleh seseorang yang menginginkan akses aman terhadap sumberdaya suatu perusahaan. Prinsipnya sama dengan kondisi network-tonetwork, hanya saja salah satu sisi gateway digantikan oleh client, seperti gambar di bawah ini :
WebVPN
WebVPN Features