Post on 14-Feb-2017
Muhammad Rafiq khan Roll: 07
Table Of Contents What is a Firewall? VPN Introduction-What is VPN and who uses it? Types of VPN’s VPN topology How it works VPN Protocols VPN Advantages TMG Introduction Summary/Conclusion
What is a Firewall? A firewall is a device which is standing between
two networks and allow authorized traffic that one satisfies the rule and policies of firewall.
OR A firewall is basically a gateway all incoming and
outgoing traffic must pass through it and as it is stated it will allow only authorized traffic.
By authorized traffic we mean the traffic that satisfies the policy of firewall.
Types of FirewallHardware Based Firewall: Those firewalls which can
be physically touchable. These firewalls are most commonly used in the world of networking to make
the local network secure. For Example: ASA (Adaptive Security Appliance) in brief it is Cisco
security deviceSoftware Based Firewall: These firewalls are in software from or these are applications that configured on systems and do the job of firewall. For Example: Windows firewall, ISA,TMG.
What is a VPN? A Virtual Private Network (VPN) extends a
private network across a public network, such as the Internet.
In simple words virtual private network is used to access private network from public network in a secure way.
Large corporation educational institutions and Government Agencies use VPN Technology to enable remote user to securely connect to a Private Network.
Who uses VPN’s?
VPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Service Provider) is available.
VPN’s allow company employees who travel often or who are outside their company headquarters to safely and securely connect to their company’s Intranet
Types of VPN Remote-Access VPN
Site-to-Site VPN
Remote-Access VPN Remote-access, also called a Virtual Private
dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.
Remote-access is used for connecting an individual computer to a network.
A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field.
Site-to-Site VPN Site-to-Site VPN allows employees in
geographically disparate offices to share one related virtual network. A VPN can also be used to interconnect two similar networks over a dissimilar middle networks, In this type of VPN a tunnel is created between to TMG as VPN servers and the both private network can access each other through internet by creation of virtual tunnel. All traffic is passed from this virtual tunnel.
VPN Protocol Point-to-point tunneling protocol (PPTP)
PPTP is widely supported by Microsoft as it is built into the various flavors of the Windows OS
PPTP initially had weak security features, however, Microsoft continues to improve its support
Advantages of VPN’s The main advantage of
VPN’s, is cost savings. VPN’s lower costs by
eliminating the need for expensive long-distance leased lines. A local leased line or even a broadband connection is all that’s needed to connect to the Internet and utilize the public network to securely tunnel a private connection.
TMG (Threat Management Gateway) Microsoft Threat Management Gateway (TMG) is
a software base firewall which can blocks all kind of traffic on network environment. TMG is a network security and protection for Microsoft Operation System .TMG is a software base firewall that can allows and denied the services to the TMG client’s machine.
Microsoft Threat Management Gateway (TMG), formerly known as Microsoft Internet Security and Acceleration server (ISA Server). Microsoft TMG is a firewall application which inspect network traffic (including web services, web content, secure web content and emails).
Requirements for TMG System with (dual core,core 2 duo, Quad
core,core i3,etc) processor to support TMG. System with at least 2GB Ram on which TMG is going
to be installed. The System must have atleast 2 NIC cards. The system must support the below operating systems.
Windows server 2008 sp2 64 Bits. Windows server 2008 R2 64 Bits.
Web services Routing and Remote Access Services
The EndThank you all for your time.