Your SlideShare is downloading. ×
0
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Virtual Private Network
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Virtual Private Network

5,039

Published on

Published in: Technology
9 Comments
27 Likes
Statistics
Notes
No Downloads
Views
Total Views
5,039
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
9
Likes
27
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Virtual Private Network
  • 2. Flow of presentation Defining VPN Characteristics Types of VPN VPN Technologies Benefits of VPN Tradeoffs in VPN
  • 3. What is VPN? A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.
  • 4. Characteristics of VPN… <ul><li>Encrypted Traffic </li></ul><ul><li>Remote site is authenticated </li></ul><ul><li>Support multiple protocols </li></ul><ul><li>Point to Point connection </li></ul>
  • 5. Types of VPN <ul><li>User VPN </li></ul><ul><li>Site VPN </li></ul>
  • 6. User VPN Remote vpn client Internet Tunnel formation Two way communication Vpn gateway Organization nw User−to−LAN connection used by a company that has employees who need to connect to the private network from various remote locations.
  • 7. Site VPN Internet Tunnel formation Two way communication Vpn gateway Organization nw Remote site Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Each site needs only a local connection to the same public network
  • 8. User and site vpn connection
  • 9. VPN Technologies <ul><li>Data confidentiality </li></ul><ul><ul><li>IPsec </li></ul></ul><ul><ul><li>L2TP </li></ul></ul><ul><ul><li>NAT </li></ul></ul><ul><li>Data Integrity </li></ul><ul><li>Data Tunneling </li></ul><ul><li>AAA </li></ul>
  • 10. Benefits of VPN <ul><li>Extend geographic connectivity </li></ul><ul><li>Reduce operational costs versus traditional WANs </li></ul><ul><li>Reduce transit times and traveling costs for remote users </li></ul><ul><li>Simplify network topology </li></ul><ul><li>Provide global networking opportunities </li></ul><ul><li>Provide telecommuter support </li></ul>
  • 11. Tradeoffs of VPN internet Internal network User computer Vpn channel Trojan horse sends traffic to internal nw over VPN Vpn Server Attacker communicates with the trojan horse via the internet TCPIP stack VPN sw Trojan horse
  • 12. Submitted by- Ashish Goel Shippi chandak Sujata Shreya Tanu venus
  • 13. <ul><li>??QUESTIONS?? </li></ul>

×