Premium Essay

Vpn for Information Technology

In: Computers and Technology

Submitted By abrononly
Words 3446
Pages 14
How Virtual Private Networks Work
Document ID: 14106

Contents
Introduction Prerequisites Requirements Components Used Conventions Background Information What Makes a VPN? Analogy: Each LAN Is an IsLANd VPN Technologies VPN Products Related Information

Introduction
This document covers the fundamentals of VPNs, such as basic VPN components, technologies, tunneling, and VPN security.

Prerequisites
Requirements
There are no specific requirements for this document.

Components Used
This document is not restricted to specific software and hardware versions.

Conventions
Refer to Cisco Technical Tips Conventions for more information on document conventions.

Background Information
The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country, or even around the world. But there is one thing that all companies need: a way to maintain fast, secure, and reliable communications wherever their offices are located. Until recently, reliable communication has meant the use of leased lines to maintain a wide−area network (WAN). Leased lines, ranging from Integrated Services Digital Network (ISDN, which runs at 144 Kbps) to Optical Carrier−3 (OC3, which runs at 155 Mbps) fiber, provide a company with a way to expand their private network beyond their immediate geographic area. A WAN has obvious advantages over a public network like the Internet when it comes to reliability, performance, and security; but maintaining a WAN, particularly when using leased lines, can become quite expensive (it often rises in cost as the distance between

the offices increases). Additionally, leased lines are not a viable solution for organizations where part of the work force is highly mobile

Similar Documents

Premium Essay

Virtual Private Network

...Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently. The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking...

Words: 4870 - Pages: 20

Premium Essay

Virtual Private Network

...Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently. The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking...

Words: 4870 - Pages: 20

Premium Essay

What Vpn Can Do for You. ( Written for Composition Class About I.T.)

...Internet Solutions Inc. What VPN can do for you A discussion of how it works, and how your business can be more efficient by using it. Richard Biondo (12825561) In a vastly growing world, we are discovering new and improved… innovated technology everyday; technology that helps people live a better life, and technology that makes businesses more productive. People now have smaller desktop computers that are faster, have better storage and process memory, and are more efficient than even five years ago; and lighter laptop computers with longer battery life that are capable of networking wirelessly. These days most homes are networked wirelessly with several laptops, making it more convenient for dad to work a few extra hours at home in the privacy of his home office while his son is on Facebook in his room with his buddies. We can also subnet other hosts as well like our smart phones, Playstations, Xbox gaming consoles etc, making it possible to use the wireless fidelity (Wi-Fi) saving our phone data plan usage and be able to play a video game with someone far away. It’s safe to say that we’ve come a very long way in the advancement of computer solutions and networking capabilities, enjoying its convenience for any reason, personal use or for business. Today a network far extends beyond a single home, office, store or campus; today we have several networking options to suit our needs as we have: local area networks (LAN- covering a single floor or building), campus...

Words: 1236 - Pages: 5

Premium Essay

It 230 Computer Networking

...Network Design: XYZ School System Network Design: XYZ School System IT 230 Computer Networking Executive Summary {complete during Week Nine} Write 3-4 paragraphs describing the goals of the network design project, assumptions, pros and cons of the proposed solutions, and project constraints. Cabling Specifications 1. The following specification represents the minimum requirements for the installation of cabling and equipment data cabling in any offices or labs to be constructed or modified for the XYZ School System. 2. Minimum Cabling Requirements a. The Data Cabling and termination shall be in accordance with wiring configurations as per ANSI/TIA/EIA-568-B standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially numbered...

Words: 6096 - Pages: 25

Premium Essay

Reports

...methods of networking techniques in order to build a successful network in Ocper, Inc. On the last proposal, the company was ready to expand its business by changing its network from peer to peer to client/ server network. Today, wireless network become more popular. In order to compete with other businesses and to adapt with the evolving technology, Ocper, Inc is getting ready to proceed to adapt wireless networking. Wireless networks are uniquely positioned today to support corporate enterprise client/server efforts in order to extend the reach of information systems to the front lines of business operations. VPN access in wireless network is also beneficial to Ocper, Inc.; because it allows an organization to carve out a private WAN through the internet, serving only its offices, while keeping the data secure and isolated from the other (public) traffic. The best option for VPN access for the employees to remotely access the Ocper, Inc. network is by way of SSL-based VPNs. They provide remote-access connectivity from almost any Internet-enabled location using a Web browser and its native SSL encryption (Greene, 2008). Keywords: wireless network, VPN access BUILDING A SUCCESSFUL NETWORK 3 Building a Successful Network A wireless network is the best network to use at Ocper, Inc. because a wireless networks are becoming increasingly popular. The president of Ocper, Inc. would like to add four servers to the network so employees can share files. With the wireless...

Words: 1076 - Pages: 5

Free Essay

U4:A1 Itt Paper

...data. A VPN connection is off-site remote access of sensitive IT systems to ensure exchanges of information are encrypted. With that being said I’m going to talk about a networked VPN infrastructure and what I would have in it. If I was doing a school I would have the VPN accessible to all Faculty and Staff members by default and is authenticated against the ALL_Faculty_Staff Security group in Active Directory. Students do not have VPN privileges. A Contractor, Temporary, or Volunteer worker requiring VPN access, must fill out a compulsory form in Human Resources prior to be granted access.  They will require a UMW sponsor who must submit the request to the ISO for final approval. Once approved, they will be entered into Banner whereby an account will then be created in Banner and AD. They can get instructions on how to install the required Cisco software client. Users using non-university owned equipment must follow IT Malicious Code Protection Standard. Records logging remote connections must be maintained and reviewed according to the University Monitoring and Logging Procedure. VPN authentication is required in addition to network authentication to remotely access backend servers and is limited to local accounts provisioned by the Server Administrator. Infrastructure equipment authentication is maintained on the TACACS. Local Accounts are provisioned for Network Services staff only. "Remote Access Standard | Information Technologies." Information Technologies. N.p., n...

Words: 284 - Pages: 2

Premium Essay

Modern Day Attacks Against Firewalls and Vpns

...Modern Day Attacks Against Firewalls and Virtual Private Networks Electronic technology is growing at a rapid rate; more devices are made mobile and wireless, but with those improvement and developments come flaws and malicious opportunities. Cyber attacks are on the rise and no system or device is immune. Many organizations employ multiple layers of firewalls but that doesn’t completely eliminate the threat. Attacks against firewalls and virtual private networks or VPNs are constantly being exploited with new methods everyday, but they are yet another obstacle that a cyber criminal must overcome. First let’s discuss what a firewall is and what a firewall is capable of doing. Firewall applications are normally used to protect and secure private networks. A network can have a software, hardware or both firewalls installed and they provide the “ability to control in-bound and outbound traffic”, according to Pirc of Sans Technology Institute (para 2, nd). Most Microsoft operating systems today come with a firewall installed and Microsoft suggests that you should have a firewall set up on each system in your home, even if you have a hardware firewall such as a router that has security policies adjusted, this can help prevent any malicious activity from spreading across your home network. Most firewalls contain a variety of policies but they all at the very least have the same basic policies that can be set up. There are 3 common policies that you...

Words: 2441 - Pages: 10

Premium Essay

Risk Analysis: Metric Machine Parts and Supplies Corp.

...Grace xxxxxx IFSM 370 Section 6380 Risk Analysis: Metric Machine Parts and Supplies Corp. This white paper examines the risks and security issues faced by MMPS Company’s strained network and the impact of those risks on the business’s data and functions. This paper would also seek to identify the business problems and evaluate technology solutions that can used to combat those risks. The challenge of mitigating security risks arising from compromised network is brought to focus in this analysis as we evaluate how to effectively build merge new technology solutions to the existing infrastructure for operational improvement. It is not of no surprise that although most businesses long for growth, they do not adequately consider scalability of their technology solutions as part of their ongoing business strategy which ultimately proves to be a costly endeavor when the need arises. The Business Problem Metric Machine Parts and Supplies Corporation (MMPS) is a growing company with over 75, 000 customers across the world cataloging over 100, 000 parts that are typically made available online to its customers. The telecommunications network aspect of the business is outsourced to an outside management company responsible for managing the upkeep of its network. Due to frequent crashes and disruptions, the MMPS is seeking other alternatives to handle the growing problems. The business telecommunication network is incapable of handling the simultaneous orders from its customers...

Words: 2106 - Pages: 9

Premium Essay

Network

...2.1.1 Network History The history of computer networking is complex. It has involved many people from all over the world over the past 35 years. Presented here is a simplified view of how the Internet evolved. The processes of invention and commercialization are far more complicated, but it is helpful to look at the fundamental development. In the 1940s computers were large electromechanical devices that were prone to failure. In 1947 the invention of a semiconductor transistor opened up many possibilities for making smaller, more reliable computers. In the 1950s mainframe computers, which were run by punched card programs, began to be used by large institutions. In the late 1950s the integrated circuit that combined several, then many, and now millions, of transistors on one small piece of semiconductor was invented. Through the 1960s mainframes with terminals were commonplace, and integrated circuits were widely used. In the late 1960s and 1970s, smaller computers, called minicomputers came into existence. However, these minicomputers were still very large by modern standards. In 1977 the Apple Computer Company introduced the microcomputer, also known as the personal computer. In 1981 IBM introduced its first personal computer. The user-friendly Mac, the open-architecture IBM PC, and the further micro-miniaturization of integrated circuits led to widespread use of personal computers in homes and businesses. In the mid-1980s users with stand-alone computers...

Words: 2656 - Pages: 11

Free Essay

Remote Network Access Technology

...NETWORK ACCESS TECHNOLOGY? or REMOTE ACCESS SERVICE ( RAS ) Remote network access technology allows access to a computer or a network from a remote distance. Employees at branch or satellite offices or telecommuters, and travelling staff members may need access to the company or agency’s network and are able to do so via remote access. Users working from home get access through an Internet service provider (ISP) or Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines. These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office. VPN REMOTE ACCESS TECHNOLOGY VPN (Virtual Private Network) & Tunneling A Virtual Private Network (VPN) is a private connection over a public network such as the Internet. VPNs can save a company a lot of money because it use Internet connection rather than expensive long-distance point-to-point connections such as dial-up, ISDN, and leased lines, to allow remote networks and remote employees to connect to the corporate network. A site-to-site or LAN-to-LAN VPN as shown below is typically used for connecting branch offices of a single organization or for creating an extranet for business partners. The second main type of VPN is called...

Words: 1041 - Pages: 5

Free Essay

Security Assessment and Recommendations for Aircraft Solutions

...Security Assessment and Recommendations for Aircraft Solutions Principles of Information Security and Privacy Keller Submitted: December 11, 2013 Executive Summary The purpose of this report is to investigate the vulnerabilities of Aircraft Solutions (AS) in the areas of hardware and policy. Furthermore, it provides recommended solutions to the security weaknesses mentioned in Phase 1. Aircraft Solutions is a well known leader in the design and production of component products and services for companies ranging from commercial industry to the aerospace industry. In addition, Aircraft Solutions maintains a large capacity plant filled with an extensive variety of equipment, which is mostly automated alongside skilled specialists in a range of fields to ensure they meet their customers’ needs. The weaknesses that are being addressed are hardware and policy. Company Overview Aircraft Solutions is a leader in the planning and production of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The headquarters of Aircraft Solutions is located in San Diego, California. The goal of Aircraft Solutions is to use machined products and related services to supply customer success, and to achieve cost, quality, and schedule requisites. They have a Defense Division (DD) of Aircraft Solutions located in Orange County, California and a Commercial Division (CD) located in San Diego County, California. Aircraft...

Words: 1560 - Pages: 7

Free Essay

Mpls-Vpn

...A report on MPLS-VPN VIT Submitted By Sameer Narula FMG19C 191169 Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next. MPLS makes it easy to create "virtual links" between distant nodes. It can encapsulate packets of various network protocols. MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular Data Link Layer technology, such as ATM, frame relay, SONET or Ethernet, and eliminate the need for multiple Layer 2 networks to satisfy different types of traffic. MPLS belongs to the family of packet-switched networks. Customer site Large customer site Customer Network (C-Network): the part of the network still under customer control Provider Network (P-Network): the Service Provider infrastructure used to provide VPN services Customer Site: a contiguous part of customer network (can encompass many physical locations) MPLS operates at an OSI Model layer that is generally considered to lie between traditional definitions of Layer 2 (Data Link Layer) and Layer 3 (Network Layer), and thus is often...

Words: 1264 - Pages: 6

Premium Essay

Job Responsibilities of a Cio

...A chief information officer (CIO) is a job title for the person in an organization that is the senior executive for the information technology department. The CIO is responsible for the strategic planning, implementing, and overseeing the entire IT department (Wikipedia, 2013). Now that the technology is more relevant than ever in business today, this is a very demanding job. Not only staying up to date with all the current technology needs and trends, but planning for the future as well. Someone who is pursuing to be a CIO, should first get their degree in the technology field. Do not get a certificate, or AA, and bachelors degree is required to get started in this position. Then an MBA in a technology area would really benefit the candidate in becoming a CIO (Woolford, 2002). According to CIO.com (Polansky, 2001) the top ten qualifications executives are looking when hiring a CIO are: ability to hire, develop and retain high-quality IT professionals, international or global experience, knowledge and experience in a specific industry, ability to create and manage change, great communications skills, superior management skills, good relationship skills, needs to be business savy, expertise in aligning and leveraging technology for the advantage of enterprise, and outstanding leadership. Being the CIO has a tremendous amount of responsibility. Business today is done mostly by technology, and if something goes wrong the IT department is usually the first to blame....

Words: 1730 - Pages: 7

Free Essay

Marketing

...rehab to accommodate IT changes in the way computers are connected has to be done. By using Electronic Health Records information can be shared amongst identified parties. To ensure information is transferred effectively amongst physician groups, and pharmacies, networks have to be established amongst the rehab, and identified organizations. Information systems needed in an ACO At present Accountable Care Organization (ACO) are being advised to make use of advancements offered by Information Technology. Information systems that are most required by health organizations are data management systems, systems to maintain electronic health records, and personal health record exchanges. By automating the process of documenting and managing vast array of information about patients, coordination of activities at the hospital can be achieved, and the hospital can be accountable for the overall care provided within its premises (Glaser & Salzberg, 2010). Information systems are required for maintaining registries, and through use of such a system all registries, labs, pharmacies, performance reporting data, and claims can be integrated. Compliance, and performance of physicians can be can be enhanced by making use of information systems ACO 2 which enable electronic prescribing, and frequent monitoring of physicians through use of Information Technology...

Words: 2376 - Pages: 10

Premium Essay

Computer Information Brief

...Computer Information Systems Brief Kudler Fine Foods is stocked with high end specialty, imported, and domestic products. The specialty foods include fresh meats, produce, packaged foods, bakery goods, cheese, wine, and specialty dairy products. They have invested in and administered the computer system appropriately for business purposes. The company stands out by offering premier goods to their customers in their three gourmet locations. Though each location is money-making, Kudler requires a renovation of the existing computer system to be viable in their niche gourmet food market. A preliminary evaluation of the computer systems, accounting practices and opportunities will be investigated to enhance the company’s accounting system also. Additionally, dangers that they will face if modifications are not completed to the existing system will be tackled. To consider and propose a valuable computer system, it is essential to appraise and make suggestions based on significant accounting procedures and business needs, record of present systems, clarification of business benefits from technology advancements and ascertaining the strengths and weaknesses with possible technology The existing computer information system that Kudler employs is an integral part in supplying data for the profitability of the business. The present computer system is grasped by all employees, is accessible 24 hours a day, seven days a week, and allows the company to thrive in sales. As the company look...

Words: 1356 - Pages: 6