Virtual Private Network VIRTUAL LEASED LINES Point to point link between two CPE IP tunnel between 2 ISP edge routers. Frames are relayed between IP tunnels.
Virtual Private Network VIRTUAL PRIVATE ROUTED NETWORK Emulation of multisite WAN using internet. Packet forwarding at network layer. VPRN specific forwarding table at ISP routers that forwards the traffic.
VIRTUAL PRIVATE DIAL-UPNETWORK On demand tunnel between remote user and corporate sites. There are possible 2 tunnels.1… compulsory tunnel.2… voluntary tunnel.
Virtual Private NetworkCOMPULSORY TUNNEL In this scenario L2TP Access Contractor (LAC) acting as a dial or network access server extends a PPP session across a backbone using L2TP to a remote L2TP Network Server (LNS). The operation of initiating the PPP session to the LAC is transparent to the user. BACK
Virtual Private NetworkVOLUNTARY TUNNEL Voluntary tunnel refers to the case where an individual host connects to a remote site using a tunnel originating on the host, with no involvement from intermediate network nodes. Tunnel mechanism chosen can be IPSec or L2TP.
VIRTUAL PRIVATE LANSEGMENTS A Virtual Private LAN Segment (VPLS) is the emulation of a LAN segment using internet facilities.
INTRANET VPN The branch office scenario securely connects two trusted intranets within the organization. Routers or firewalls acting as gateways for the office with vpn capabilities can be used to protect the corporate traffic.
EXTRANET VPN Inthis scenario multiple supplier intranets that need to access a common corporate network over the Internet. Each supplier is allowed access to only a limited set of destinations within the corporate network.
REMOTE ACCESS VPNA remote user wants to be able to communicate securely and cost-effectively to his corporate intranet. This can be done by use of an VPN IPSec enabled remote client and firewall (or gateway).
LAYER2 TRANSMISSIONPROTOCOL What is actually the layer two transmission protocol ??? NEXT
POINT TO POINTTUNNELING PROTOCOL Introduction to PPTP. How actually PPTP works ??? Security provided by PPTP. Advantages of PPTP. Disadvantages of PPTP. BACK
INTERNET PROTOCOLSECURITY Introduction to IP security. Features of IP security. Types of IPsec protocols. Types of modes used in IPsec. BACK
SECURITY OF VPN Hardware solution Remote access control.
CERTAIN H/W AND S/WSPECIFICATIONS… Desktop software client for each remote user Dedicated hardware such as a VPN Concentrator or Secure PIX Firewall Dedicated VPN server for dial-up services NAS (Network Access Server) used by service provider for remote user VPN access
Virtual Private NetworkVPN CONCENTRATOR Itincorporates the most advanced encryption and authentication techniques for Remote access VPN.
Virtual Private NetworkVPN-OPTIMIZED ROUTER VPN-optimized routers provide scalability, routing, security and quality of service.
Virtual Private NetworkPIX FIREWALL Firewallcombines dynamic network address translation, proxy server, packet filtration, firewall and VPN capabilities in a single piece of hardware.
ADVANTAGES OF VPN Cost saving. Reduces the long distance charges of electronic transactions. Concrete security.
DISADVANTAGES OF VPNVPNs require an in-depth understanding of public network security issues and taking proper precautions in VPN deployment. The availability and performance of an organizations wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. VPN technologies from different vendors may not work well together due to immature standards.
CONCLUSION From this we can conclude that VPN provides a very safe , secure and cost- effective communication infrastructure.