Virtual Private Network

6,014 views

Published on

Published in: Technology
10 Comments
28 Likes
Statistics
Notes
No Downloads
Views
Total views
6,014
On SlideShare
0
From Embeds
0
Number of Embeds
614
Actions
Shares
0
Downloads
0
Comments
10
Likes
28
Embeds 0
No embeds

No notes for slide

Virtual Private Network

  1. 1. Virtual Private Network
  2. 2. Flow of presentation Defining VPN Characteristics Types of VPN VPN Technologies Benefits of VPN Tradeoffs in VPN
  3. 3. What is VPN? A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.
  4. 4. Characteristics of VPN… <ul><li>Encrypted Traffic </li></ul><ul><li>Remote site is authenticated </li></ul><ul><li>Support multiple protocols </li></ul><ul><li>Point to Point connection </li></ul>
  5. 5. Types of VPN <ul><li>User VPN </li></ul><ul><li>Site VPN </li></ul>
  6. 6. User VPN Remote vpn client Internet Tunnel formation Two way communication Vpn gateway Organization nw User−to−LAN connection used by a company that has employees who need to connect to the private network from various remote locations.
  7. 7. Site VPN Internet Tunnel formation Two way communication Vpn gateway Organization nw Remote site Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Each site needs only a local connection to the same public network
  8. 8. User and site vpn connection
  9. 9. VPN Technologies <ul><li>Data confidentiality </li></ul><ul><ul><li>IPsec </li></ul></ul><ul><ul><li>L2TP </li></ul></ul><ul><ul><li>NAT </li></ul></ul><ul><li>Data Integrity </li></ul><ul><li>Data Tunneling </li></ul><ul><li>AAA </li></ul>
  10. 10. Benefits of VPN <ul><li>Extend geographic connectivity </li></ul><ul><li>Reduce operational costs versus traditional WANs </li></ul><ul><li>Reduce transit times and traveling costs for remote users </li></ul><ul><li>Simplify network topology </li></ul><ul><li>Provide global networking opportunities </li></ul><ul><li>Provide telecommuter support </li></ul>
  11. 11. Tradeoffs of VPN internet Internal network User computer Vpn channel Trojan horse sends traffic to internal nw over VPN Vpn Server Attacker communicates with the trojan horse via the internet TCPIP stack VPN sw Trojan horse
  12. 12. Submitted by- Ashish Goel Shippi chandak Sujata Shreya Tanu venus
  13. 13. <ul><li>??QUESTIONS?? </li></ul>

×