EncartaLabs

Virtual Private Networks (VPN)

( Duration: 2 Days )

The Virtual private networks training course extend private networks by moving information across a public domain, such as the internet. With the developing nature of these networks, this course is beneficial to employees in the VPN industry. This field has changed dramatically since it was first created, as early data networks relied on VPN connectivity through dial-up modems and leased line connections.

By attending Virtual private networks workshop, Participants will learn to:

  • Understand IPsec, featuring the Authentication Header, Encapsulating Security Payload, Internet Key
  • Exchange, and implementation details
  • Understand PPTP, L2F, L2TP, and MPLS as VPN tunneling protocols
  • Review Two-party and three-party authentication, including RADIUS and Kerberos
  • Explore Public key infrastructure (PKI) concept and its integration into VPN solutions
  • Understand Access control policies, mechanisms, and management, and their application to VPNs
  • Review VPN gateway functions, including site-to-site intranet, remote access, and extranet
  • Review Gateway configuration, provisioning, monitoring, and accounting
  • Explore Gateway interaction with firewalls and routers
  • Understand VPN client implementation issues, including interaction with operating systems
  • Understand Client operation issues, including working with NAT, DNS, and link MTU limits
  • Explore VPN service and network management architectures and tunnel and security management
  • Review successful VPN deployments
  • Discuss successful and unsuccessful VPN deployments
  • Step through a practical process for managing a VPN deployment project
  • Explore the current and future market trends

IT Managers, Security Officers, Network Engineers, Tech Support and anyone who is interested in VPN.

COURSE AGENDA

1

Introduction

  • VPN Definition
  • Potential Uses and Benefits
  • VPN Motivation
  • The VPN Market
  • VPN Requirements
  • Building Blocks of a VPN
  • VPN Technologies
  • VPN Topology
  • VPN Protocols
  • VPN versus Mobile IP
2

VPN Architectures

  • VPN Requirements, Building Blocks, and Architectures
  • Implementer-based VPN Architectures
  • Security-based VPN Architectures
  • Layer-based VPN Architectures
  • Class-based VPN Architectures Site-to-Site Intranet VPNs
  • Remote Access VPNs
  • Extranet VPNs
3

Key Aspects of VPN Security

  • Overview of Network Security
  • Internet Architecture
  • Security Issues Connecting to Internet
  • Relevant Cryptography
  • Generic Secure Channel
  • Cryptography
  • Shared Key Cryptography
  • Public Key Cryptography
  • Digital Signatures
  • Message Authentication Codes
4

Tunnels and VPN Data Integrity and Confidentiality

5

VPN Tunneling Protocols

  • PPTP
  • L2F
  • L2TP
  • Ipsec
  • MPLS
6

Point-to-Point Protocol (PPP)

  • Overview and Basic Operation
  • Basis for L2 VPN Protocols
  • Major Components
  • Wire Authentication Protocols
  • Backend Authentication Servers
  • Configuration of Network Protocols
7

Layer Two VPN Protocols

  • Common Aspects
  • Advantages and Disadvantages
  • Layer Two Forwarding (L2F)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Layer Two Tunneling Protocol (L2TP)
8

IP Security Protocol (IPSEC)

  • Basic IPsec Concepts
  • IPsec and VPNs
  • Authentication Header (AH)
  • Encapsulating Security Payload (ESP)
  • Internet Key Exchange (IKE)
  • Operational Modes
  • Security Associations
  • Mandatory Configurations
  • Issues with Remote Access
  • Key Management
  • ANX Implementation
  • L2TP with IPSEC
  • Phase 1 Negotiation
  • Phase 2 Negotiation
  • IPsec Implementation
9

Authentication and access control in VPN

  • PAP and CHAP
  • PPP Authentication
  • RADIUS
  • S/KEY and OTP
  • Trusted Third-Party Authentication
  • Kerberos
  • X.509 Public Key Infrastructure
  • Pretty Good Privacy Trust Model
  • Authentication in VPNs
  • Gateway-Gateway Authentication
  • Access Control Policy
  • Access Control Rules
  • Access Control Lists
  • Access Control Policy Management
  • Access Control in VPNs
10

Public Key Infrastructure (PKI) and VPNs

  • PKI Architecture
  • Certification
  • Validation
  • Trust Models
  • Digital Certificate Formats
  • X.509 Digital Certificate
  • Certificate Management System
  • Certificate Protocols
  • Certificate Use in VPNs
11

VPN SOLUTIONS and implementations

  • Assessing Your Environment and Needs
  • Design Methodology
  • Basic Administrative Tasks
  • VPN Project Management
  • Successful VoIP deployments
  • A practical process for managing a VoIP deployment project
  • VPN Gateways
  • Gateway Configuration and Provisioning
  • VPN Gateway and Firewall
  • VPN Design Issues
  • A VPN Solution Scenario
  • VPN Clients
  • Alternative VPN Clients
  • A Remote Access VPN Scenario
12

QOS and Performance Issues

  • Factors Affecting Performance
  • QOS Defined
  • TCP Operation
  • Broad Protocol Options
  • Applicability to VPNs
  • Role of the ISP
13

Multiprotocol Label Switching (MPLS)

  • Evolution of Typical ISP Backbone
  • Attempts at Switching IP Traffic
  • Applicability to VPNs
14

VPN Network and Service Management

  • Network Management Architecture
  • Network Management Protocols
  • Applicable MIBs and Probes
  • SNMP Issues
  • VPN Service Management
  • Service Level Agreement
  • Network Operations Center (NOCs)
  • Redundancy and Load-balancing
  • Integration with Existing Security
15

Survey of VPN Products and Services

  • Product Categories
  • Vendor Survey
  • Factors in Product Selection
  • Outsourcing Options
  • Future Trends

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 3,500 Modules on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 20,000 corporate candidates across india and abroad
  • All our trainings are conducted in workshop mode with more focus on hands On

View our other course offerings by visiting www.encartalabs.com/course-catalogue

Contact us for delivering this course as a public/open-house workshop for a group of 10+ candidates at our venue

Top