SlideShare a Scribd company logo
1 of 26
VPN:
Virtual Private Network
Presented by:
Ch Mohammad Usman
Roll No 15111
VPN Stands For :
• Virtual
• Private
• Network
What is VPN ?
• A Virtual Private Network (VPN) is a network
technology that creates a secure network
connection over a public network such as the
Internet or a private network owned by a service
provider. Large corporations, educational
institutions, and government agencies use VPN
technology to enable remote users to securely
connect to a private network.
Common VPN
Protocols
• Point-to-Point Tunneling Protocol (PPTP)
• Layer 2 Tunneling Protocol (L2TP)
• Internet Protocol Security (IPSec)
• Secure Sockets Layer (SSL)
Why you want a
VPN ?
• You can use it to connect securely to a remote
network via the Internet. Most companies
maintain VPNs so that employees can access
files, applications, printers, and other resources
on the office network without compromising
security.
• If you're concerned about your online privacy,
connecting to an encrypted VPN while you're on a
public or untrusted network—such as a Wi-Fi
hotspot in a hotel or coffee shop—is a smart, simple
security practice. Because the VPN encrypts your
Internet traffic, it helps to stop other people who
may be trying to snoop on your browsing via Wifi to
capture your passwords.
• one of the best reasons to use a VPN is to regional
restrictions, known as geo-blocking on certain websites.
Journalists and political dissidents use VPNs to get
around state-sponsored censorship all the time, but you
can also use a VPN for recreational purposes, such as
connecting to a British VPN to watch the YouTube
videos in Pakistan. Because your Internet traffic routes
through the VPN, it looks as if you're just British visitor.
Why to use VPN
( Short Story )
• Different types of threats continue to increase -
security
• It’s available and supported
• You can connect from anywhere and be ensured
you have a secure communication channel back to
Campus
• It’s supported across multiple platforms
• Extends the Campus network to remote users
How VPN Works
• GCUF Server is configured as a VPN Server
• The local GCUF VPN computer connects to its ISP
• The remote VPN wizard runs on the GCUF Server on the
remote network
• The remote GCUF Swl Server VPN computer connects to
its ISP
• When a computer on the local network communicates with
a computer on the remote network, data is encapsulated
and sent through the VPN tunnel
Types Of VPN
Three Types of implementation.
• Intranet – Within an organization
• Extranet – Outside an organization
• Remote Access – Employee to Business
Connection
Without VPN
• Loss of privacy
• Loss of data integrity
• Identity spoofing
• Difficult to secure
• Modified transactions
Secure with VPN
Protected secure communication channel
• Encrypted data
• Provides authentication
• Can connect from anywhere
• Encapsulated Data
How To Create A
VPN In Windows
10
1) Log on to your Windows 10 PC with an administrator
account.
2) Once on the desktop window, click the Start button
from the bottom-left corner of the screen.
3) From the left section of the displayed Start menu,
under the Places section, clickSettings.
4) On the open Settings window, click the Network &
Internet icon.
5) From the left pane of the open Network &
Internet window, click to select the VPN category.
6) From the right pane, click the + icon representing
the Add a VPN connection option.
7) On the Add a VPN connection box, populate the fields
with the correct values.
8) Make sure that the Remember my sign-in
info checkbox at the bottom is checked, and
click Save.
Note: You may not want to save the sign-in info
on public computers such as those in Internet
cafes, or libraries. Do NOT check the Remember
my sign-in info when using such computers.
9) Once the new VPN connection is successfully created,
back on the Network & Internet window, keeping
the VPN category selected from the left pane, click to
select the newly created VPN connection from the
right.
 Once selected, from the available buttons, you can
either click Connect or Forget to connect to the VPN
server using the provided details and credentials, or to
remove the created connection respectively. Optionally,
if needed, you can also click the Properties button to
make changes to the created VPN connection.
Future of VPN:
Companies with
VPN
References
• www.youtube.com
• www.slideshare.net
• www.csun.edu
• en.wikipedia.org
• www.webopedia.com
Thank You

More Related Content

What's hot

Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private NetworkShubhayu Roy
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 

What's hot (20)

Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Vpn
VpnVpn
Vpn
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 

Viewers also liked

VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)tsholson
 
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New YorkSCCE
 
CV_A Beukman_English
CV_A Beukman_EnglishCV_A Beukman_English
CV_A Beukman_EnglishAnita Beukman
 
Resumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidadResumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidadMaximiliam Durán Millavil
 
Cómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familiasCómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familiasSCCE
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private networkHabibullah Adel
 
Лекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языкаЛекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языкаfiadotau
 

Viewers also liked (13)

VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)
 
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
 
Certifications
CertificationsCertifications
Certifications
 
CV_A Beukman_English
CV_A Beukman_EnglishCV_A Beukman_English
CV_A Beukman_English
 
Resumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidadResumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidad
 
Cómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familiasCómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familias
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private network
 
Лекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языкаЛекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языка
 
Visión de la unica y propuestas de crea
Visión de la unica y propuestas de creaVisión de la unica y propuestas de crea
Visión de la unica y propuestas de crea
 
Tomorrowland
Tomorrowland Tomorrowland
Tomorrowland
 
Propuesta de estatuto de CREA.
Propuesta de estatuto de CREA.Propuesta de estatuto de CREA.
Propuesta de estatuto de CREA.
 

Similar to Vpn " Virtual Private Network "

Similar to Vpn " Virtual Private Network " (20)

VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Vpn " Virtual Private Network "

  • 1. VPN: Virtual Private Network Presented by: Ch Mohammad Usman Roll No 15111
  • 2. VPN Stands For : • Virtual • Private • Network
  • 3. What is VPN ? • A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.
  • 4. Common VPN Protocols • Point-to-Point Tunneling Protocol (PPTP) • Layer 2 Tunneling Protocol (L2TP) • Internet Protocol Security (IPSec) • Secure Sockets Layer (SSL)
  • 5. Why you want a VPN ? • You can use it to connect securely to a remote network via the Internet. Most companies maintain VPNs so that employees can access files, applications, printers, and other resources on the office network without compromising security.
  • 6. • If you're concerned about your online privacy, connecting to an encrypted VPN while you're on a public or untrusted network—such as a Wi-Fi hotspot in a hotel or coffee shop—is a smart, simple security practice. Because the VPN encrypts your Internet traffic, it helps to stop other people who may be trying to snoop on your browsing via Wifi to capture your passwords.
  • 7. • one of the best reasons to use a VPN is to regional restrictions, known as geo-blocking on certain websites. Journalists and political dissidents use VPNs to get around state-sponsored censorship all the time, but you can also use a VPN for recreational purposes, such as connecting to a British VPN to watch the YouTube videos in Pakistan. Because your Internet traffic routes through the VPN, it looks as if you're just British visitor.
  • 8. Why to use VPN ( Short Story ) • Different types of threats continue to increase - security • It’s available and supported • You can connect from anywhere and be ensured you have a secure communication channel back to Campus • It’s supported across multiple platforms • Extends the Campus network to remote users
  • 9. How VPN Works • GCUF Server is configured as a VPN Server • The local GCUF VPN computer connects to its ISP • The remote VPN wizard runs on the GCUF Server on the remote network • The remote GCUF Swl Server VPN computer connects to its ISP • When a computer on the local network communicates with a computer on the remote network, data is encapsulated and sent through the VPN tunnel
  • 10. Types Of VPN Three Types of implementation. • Intranet – Within an organization • Extranet – Outside an organization • Remote Access – Employee to Business
  • 11. Connection Without VPN • Loss of privacy • Loss of data integrity • Identity spoofing • Difficult to secure • Modified transactions
  • 12. Secure with VPN Protected secure communication channel • Encrypted data • Provides authentication • Can connect from anywhere • Encapsulated Data
  • 13. How To Create A VPN In Windows 10 1) Log on to your Windows 10 PC with an administrator account. 2) Once on the desktop window, click the Start button from the bottom-left corner of the screen. 3) From the left section of the displayed Start menu, under the Places section, clickSettings.
  • 14.
  • 15. 4) On the open Settings window, click the Network & Internet icon.
  • 16. 5) From the left pane of the open Network & Internet window, click to select the VPN category. 6) From the right pane, click the + icon representing the Add a VPN connection option.
  • 17.
  • 18. 7) On the Add a VPN connection box, populate the fields with the correct values. 8) Make sure that the Remember my sign-in info checkbox at the bottom is checked, and click Save.
  • 19.
  • 20. Note: You may not want to save the sign-in info on public computers such as those in Internet cafes, or libraries. Do NOT check the Remember my sign-in info when using such computers.
  • 21. 9) Once the new VPN connection is successfully created, back on the Network & Internet window, keeping the VPN category selected from the left pane, click to select the newly created VPN connection from the right.
  • 22.  Once selected, from the available buttons, you can either click Connect or Forget to connect to the VPN server using the provided details and credentials, or to remove the created connection respectively. Optionally, if needed, you can also click the Properties button to make changes to the created VPN connection.
  • 23.
  • 25. References • www.youtube.com • www.slideshare.net • www.csun.edu • en.wikipedia.org • www.webopedia.com