Vpn presentation
Upcoming SlideShare
Loading in...5
×
 

Vpn presentation

on

  • 2,121 views

 

Statistics

Views

Total Views
2,121
Views on SlideShare
2,121
Embed Views
0

Actions

Likes
1
Downloads
79
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Vpn presentation Vpn presentation Presentation Transcript

  • BY : WAQAS ANWAR
    • TUNNELING
    • FOUR PROTOCOLS USED IN VPN
    • VPN ENCAPSULATION OF PACKETS
    • TYPES OF IMPLEMENTATIONS
    • VPN BASIC ARCHITECTURE
    • ADVANTAGES
    • DIS ADVANTAGES
    • APPLICATIONS OF VPN
    • INDUSTRIES THAT MAY USE A VPN
    • SOME BUSINESSES THAT MAY USE A VPN
    • FUTURE OF A VPN
  • Tunneling
    • A virtual point-to-point connection
    • made through a public network. It transports
    • encapsulated datagrams.
    Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram 1-18
  • Four Protocols used in VPN
    • PPTP -- Point-to-Point Tunneling Protocol
    • L2TP -- Layer 2 Tunneling Protocol
    • IPsec -- Internet Protocol Security
    • SOCKS – is not used as much as the ones above
    1-18
  • VPN Encapsulation of Packets 1-18
  • Types of Implementations
    • Three Types of implementation.
      • Intranet – Within an organization
      • Extranet – Outside an organization
      • Remote Access – Employee to Business
    1-18
  • VPN Basic Architecture 1-18
  • Advantages
    • Eliminating the need for expensive long-distance leased lines
    • Reducing the long-distance telephone charges for remote access.
    • Operational costs
    • Flexibility of growth
    • Efficiency with broadband technology
    1-18
  • Disadvantages
    • VPNs require an in-depth understanding of public network security issues and proper deployment of precautions
    • Availability and performance depends on factors largely outside of their control
    • Immature standards
    • VPNs need to accommodate protocols other than IP and existing internal network technology
    1-18
  • Applications: Site-to-Site VPNs
    • Large-scale encryption between multiple fixed sites such as remote offices and central offices
    • Network traffic is sent over the branch office Internet connection
    • This saves the company hardware and management expenses
    1-18
  • Site-to-Site VPNs 1-18
  • Applications: Remote Access
    • Encrypted connections between mobile or remote users and their corporate networks
    • Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server.
    • Ideal for a telecommuter or mobile sales people.
    • VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable
    1-18
  • Industries That May Use a VPN
    • Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider
    • Manufacturing : allow suppliers to view inventory & allow clients to purchase online safely
    • Retail: able to securely transfer sales data or customer info between stores & the headquarters
    • Banking/Financial: enables account information to be transferred safely within departments & branches
    • General Business: communication between remote employees can be securely exchanged
    1-18
  • Some Businesses using a VPN
    • CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN
    • ITW Foilmark secured remote location orders, running reports, & internet/intranet communications w/ a 168-bit encryption by switching to OpenReach VPN
    • Bacardi & Co. Implemented a 21-country- 44-location VPN
    1-18
  • FUTURE OF VPNs
    • VPNs are continually being enhanced.
    • As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types.
    • Networks are expected to converge to create an integrated VPN
    • Improved protocols are expected, which will also improve VPNs.
    1-18
    • In my conclusion virtual private network is an,
    • Eliminating the need for expensive long-distance leased lines
    • Reducing the long-distance telephone charges for remote access.
    • Transferring the support burden to the service providers
    • Operational costs
    • Flexibility of growth
    • Efficiency with broadband technology
  • 1:Feilner, Markus. "Chapter 1 - VPN—Virtual Private Network". OpenVPN: Building and Integrating Virtual Private Networks: Learn How to Build Secure VPNs Using this Powerful Open Source Application. Packt Publishing. 2: Address Allocation for Private Internets, RFC 1918, Y. Rekhter et al. 3: RFC 2917, A Core MPLS IP VPN Architecture 4: Layer Two Tunneling Protocol "L2TP", RFC 2661, W. Townsley et al. 5: IP Based Virtual Private Networks, RFC 2341, A. Valencia et al 6: Point-to-Point Tunneling Protocol (PPTP), RFC 2637, K. Hamzeh et al. 7: Http://en.wikipedia.org/wiki/vpn
  •