Virtual Private Network

1,228
-1

Published on

Published in: Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,228
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
45
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Virtual Private Network

  1. 1. DYNAMIC VIRTUAL PRIVATE NETWORK
  2. 2. What Is A VPN? <ul><li>It is a private network that uses a public network to connect remote sites or users together. </li></ul><ul><li>Instead of dedicated leased lines it uses virtual connections . </li></ul>
  3. 3. A Virtual Private Network
  4. 4. What makes a VPN? <ul><li>There are 2 common VPN types: </li></ul><ul><li>Remote Access </li></ul><ul><li>Site-to-Site </li></ul>
  5. 5. Remote Access VPN <ul><li>Also called a VPDN i.e. Virtual Private Dial-up network. </li></ul><ul><li>It is a user to LAN connection. </li></ul><ul><li>It permits secure & encrypted connections between a company’s private network and remote users. </li></ul>
  6. 6. Site-to-Site VPN <ul><li>This may be one of the following- </li></ul><ul><li>Intranet based – Low cost , tunneled connections with services like IPSec. </li></ul><ul><li>Extranet based – Provides enhanced security features. It extends WANs to business partners. </li></ul>
  7. 7. Types Of VPN
  8. 8. What is Tunneling? <ul><li>It is the process of placing an entire packet within another packet and sending it over a network. </li></ul><ul><li>It allows the users to encapsulate their data in IP packets to securely transfer the contents that lies within. </li></ul>
  9. 9. … continued <ul><li>Tunneling requires 3 protocols: </li></ul><ul><li>Carrier Protocol – used by the network </li></ul><ul><li>Encapsulating protocol – the protocol that is wrapped around the data. </li></ul><ul><li>Passenger protocol – the original data. </li></ul>
  10. 10. VPN Protocols <ul><li>4 different protocols are there for creating VPN over Internet </li></ul><ul><li>PPTP - Point-to-Point Tunneling protocol </li></ul><ul><li>L2F – Layer 2 Forwarding </li></ul><ul><li>L2TP – Layer 2 Tunneling Protocol </li></ul><ul><li>IPSec – IP Security Protocol </li></ul>
  11. 11. Drawbacks of VPN <ul><li>Security – prone to be hacked </li></ul><ul><li>Authentication – No proof of the sender </li></ul><ul><li>Encryption – problem related with the Keys. </li></ul>
  12. 12. Traditional VPN Solutions <ul><li>VANs – Value Added Networks </li></ul><ul><li>based on private , closed , leased line or dial-up access </li></ul><ul><li>Advantages: </li></ul><ul><li>Fast and High Volume transfer of data. </li></ul><ul><li>Limitations: </li></ul><ul><li>Expensive and Restricted </li></ul><ul><li>Companies need to be belonged to same VAN to execute transactions. </li></ul>
  13. 13. …… continued <ul><li>Routers , Firewalls and Encrypted Routers </li></ul><ul><li>provides a fair degree of security but the security can be compromised by someone using a stolen key. </li></ul><ul><li>also the router system is too brittle to accommodate multiple users. </li></ul>
  14. 14. The Solution : DVPN <ul><li>DVPN i.e. Dynamic Virtual Private Network </li></ul><ul><li>Dynamic stands for its ability to accommodate open , changing business requirements . This ability is based on its unique architecture and set of other features. </li></ul>
  15. 15. Working Of DVPN <ul><li>Before actually using it, a user or service must first join the VPN by registering with the CA. </li></ul><ul><li>A Local Registration Agent approves all the registration requests. </li></ul>
  16. 16. … .continued <ul><li>The following steps illustrate user requesting information from a server : </li></ul><ul><li>A user request information using a desktop application such as Internet Browser. </li></ul><ul><li>The application secures and sends a message. </li></ul>
  17. 17. … continued <ul><li>The Message is transmitted over the network. </li></ul><ul><li>The received message must pass security. </li></ul><ul><li>For requests , the user’s access rights are verified. </li></ul><ul><li>The requested information is secured and returned over the internet </li></ul>
  18. 18. Capabilities and Features Of DVPN <ul><li>Provides enhanced security </li></ul><ul><li>Accommodates dynamically changes communities of users </li></ul><ul><li>Provides ability to exchange information in various forms(web pages,files etc.) </li></ul><ul><li>Maintains integrity over time regardless of any changes in technology. </li></ul>
  19. 19. Features Of DVPN <ul><li>Distributes access control mechanism </li></ul><ul><li>Application independence </li></ul><ul><li>Access control based on strongly anthenticated user identities </li></ul><ul><li>Support for user groups. </li></ul>
  20. 20. CONCLUSION <ul><li>No matter how secure a company’s network is , hackers will still look for compromising the security , especially when it comes to VPN connections. </li></ul><ul><li>So in order for businesses to receive full benefits of intranets and Internet technology , a DVPN needs to be implemented to establish trust in open environments & to make it flexible & finely controlled. </li></ul>
  21. 21. THANK YOU….

×