SlideShare a Scribd company logo
1 of 3
Netmetric Solutions
                       ( Meer Shahanawaz ) ( Abdullah )




                              VPN Definition
Virtual Private Network. A network which uses the public network to transfer
information using secure methods. For example, you could set up a VPN between
your home office and your business office using security and encryption and the
Internet as your transfer pipe.

VPN is used to make the communication between two private networks over the
Internet.




A VPN carris private traffic over a public network using advanced encryption and
tunnels to protect:
       .Confentiality of Information
              .integrity of data
                      .Authentication of users

 A VPN is used to make the tunnel between two private netwoks over the
internet.
            . A tunnel is a virtual point-point connection.
                   . The tunnel carries one protocol inside another protocol
                            . Encryption transforms content information into
ciphertext                         . Decryption restores content information from
ciphertext

Types of VPN
     1.Site to Site VPN                2.Remote Access VPN

VPN with different Host
       1.PC ( Host ) to PC (Host )      2.PC (Host) to       Router
                         3.Router to     Router                 4.Router   to
Firewall                       5.Firewall to    Firewall




1.VPN used the protocols to make the tunnel , such as
             PPTP    Point to Point Protocol
                   L2TP     Layer 2 Tunneling Protocol
                          IPSEC Internet Protocol Security




2.VPN   used to make the Gateway to Gateway to communication
3.VPN is used to encrypt the using some public or private key , so that only
authorized users is able to decrypt the communication.




                                       PPTP        Definition

                Point-to-Point Tunneling Protocol, a new technology for creating
Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S.
Robotics, and several remote access vendor companies, known collectively as the
PPTP Forum. A VPN is a private network of computers that uses the public Internet to
connect some nodes. Because the Internet is essentially an open network, the Point-
to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from
one VPN node to another are secure. With PPTP, users can dial in to their corporate
network via the Internet.

                                        L2TP       Definition



Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate
Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP
from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the
protocol.




                                           IP SECURITY


Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the
IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs).
IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion
(payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the
header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.

For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through
a protocol known as Internet Security Association and Key Management Protocol/Oakley
(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using
digital certificates

More Related Content

What's hot

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 

What's hot (20)

Vpn
VpnVpn
Vpn
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Mpls based vpn connectivity
Mpls based vpn connectivityMpls based vpn connectivity
Mpls based vpn connectivity
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Understanding of MQTT for IoT Projects
Understanding of MQTT for IoT ProjectsUnderstanding of MQTT for IoT Projects
Understanding of MQTT for IoT Projects
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPIoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport)MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport)
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
VPN
VPNVPN
VPN
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesThe Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 

Viewers also liked

Updated registration packet2010
Updated registration packet2010Updated registration packet2010
Updated registration packet2010
Sandy Chamber
 
הסוזן התוכנית לחטוף את בגין
הסוזן   התוכנית לחטוף את בגיןהסוזן   התוכנית לחטוף את בגין
הסוזן התוכנית לחטוף את בגין
haimkarel
 
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศการแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
Princess Chulabhorn's College, Chiang Rai Thailand
 
שיעור שתיים מעבד התמלילים
שיעור שתיים   מעבד התמליליםשיעור שתיים   מעבד התמלילים
שיעור שתיים מעבד התמלילים
haimkarel
 
Tdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-productsTdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-products
TDR d.o.o Rovinj
 
Estonia Power Point
Estonia Power PointEstonia Power Point
Estonia Power Point
guestfc17a1
 
Global Trends in Open Educational Resources
Global Trends in Open Educational ResourcesGlobal Trends in Open Educational Resources
Global Trends in Open Educational Resources
nazzzy
 

Viewers also liked (20)

Updated registration packet2010
Updated registration packet2010Updated registration packet2010
Updated registration packet2010
 
written shot by shot
written shot by shotwritten shot by shot
written shot by shot
 
הסוזן התוכנית לחטוף את בגין
הסוזן   התוכנית לחטוף את בגיןהסוזן   התוכנית לחטוף את בגין
הסוזן התוכנית לחטוף את בגין
 
Replacing Rounds PSA Stonaker
Replacing Rounds PSA StonakerReplacing Rounds PSA Stonaker
Replacing Rounds PSA Stonaker
 
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศการแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
 
Retrospectiva primului an de participare la Programul BIBLIONET
Retrospectiva primului an de participare la Programul BIBLIONETRetrospectiva primului an de participare la Programul BIBLIONET
Retrospectiva primului an de participare la Programul BIBLIONET
 
Ujian koko 2013
Ujian koko 2013Ujian koko 2013
Ujian koko 2013
 
2merchan
2merchan2merchan
2merchan
 
1
11
1
 
Psdeg
PsdegPsdeg
Psdeg
 
Laudo
LaudoLaudo
Laudo
 
שיעור שתיים מעבד התמלילים
שיעור שתיים   מעבד התמליליםשיעור שתיים   מעבד התמלילים
שיעור שתיים מעבד התמלילים
 
Interacciones de quimioterapia y radioterapia
Interacciones de quimioterapia y radioterapiaInteracciones de quimioterapia y radioterapia
Interacciones de quimioterapia y radioterapia
 
Exchange server
Exchange   serverExchange   server
Exchange server
 
Tdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-productsTdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-products
 
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu SrbijePrezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
 
เมียนม่าร์
เมียนม่าร์เมียนม่าร์
เมียนม่าร์
 
Estonia Power Point
Estonia Power PointEstonia Power Point
Estonia Power Point
 
Global Trends in Open Educational Resources
Global Trends in Open Educational ResourcesGlobal Trends in Open Educational Resources
Global Trends in Open Educational Resources
 
Vietnam paisatges
Vietnam paisatgesVietnam paisatges
Vietnam paisatges
 

Similar to Vpn

Similar to Vpn (20)

Vpn
VpnVpn
Vpn
 
V P N
V P NV P N
V P N
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
F0322038042
F0322038042F0322038042
F0322038042
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private Network
 
Vpn protocols
Vpn protocolsVpn protocols
Vpn protocols
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Ip sec
Ip secIp sec
Ip sec
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
Vpn security
Vpn security Vpn security
Vpn security
 

More from proser tech

A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command line
proser tech
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32
proser tech
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPt
proser tech
 

More from proser tech (18)

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Outlook Express
Outlook ExpressOutlook Express
Outlook Express
 
Double routing
Double  routingDouble  routing
Double routing
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trust
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do i
 
Network printer
Network printerNetwork printer
Network printer
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command line
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32
 
Excell shortcuts
Excell shortcutsExcell shortcuts
Excell shortcuts
 
Windows xp tips
Windows xp tipsWindows xp tips
Windows xp tips
 
Xlshortcuts07
Xlshortcuts07Xlshortcuts07
Xlshortcuts07
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Card
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPt
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Vpn

  • 1. Netmetric Solutions ( Meer Shahanawaz ) ( Abdullah ) VPN Definition Virtual Private Network. A network which uses the public network to transfer information using secure methods. For example, you could set up a VPN between your home office and your business office using security and encryption and the Internet as your transfer pipe. VPN is used to make the communication between two private networks over the Internet. A VPN carris private traffic over a public network using advanced encryption and tunnels to protect: .Confentiality of Information .integrity of data .Authentication of users A VPN is used to make the tunnel between two private netwoks over the internet. . A tunnel is a virtual point-point connection. . The tunnel carries one protocol inside another protocol . Encryption transforms content information into ciphertext . Decryption restores content information from ciphertext Types of VPN 1.Site to Site VPN 2.Remote Access VPN VPN with different Host 1.PC ( Host ) to PC (Host ) 2.PC (Host) to Router 3.Router to Router 4.Router to Firewall 5.Firewall to Firewall 1.VPN used the protocols to make the tunnel , such as PPTP Point to Point Protocol L2TP Layer 2 Tunneling Protocol IPSEC Internet Protocol Security 2.VPN used to make the Gateway to Gateway to communication
  • 2. 3.VPN is used to encrypt the using some public or private key , so that only authorized users is able to decrypt the communication. PPTP Definition Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. A VPN is a private network of computers that uses the public Internet to connect some nodes. Because the Internet is essentially an open network, the Point- to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. L2TP Definition Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the protocol. IP SECURITY Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs).
  • 3. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates