SlideShare a Scribd company logo
1 of 25
Virtual Private Network(VPN)
Contents:
▪ Introduction:VPN
▪ Traditional Connectivity
▪ Remote Access Virtual Private Network
▪ Brief Overview of How it Works
▪ Four Critical Functions
▪ Tunneling
▪ Four Protocols used in VPN
Contents:
▪ VPNTopology :Type ofVPNs
▪ Remote AccessVPN
▪ Site to siteVPN
▪ VPN Security
▪ VPN : Advantages
▪ VPN : Disadvantages
▪ Applications
▪ Future OfVPN
▪ References
Introduction: VPN
▪ Linking of two or more computing devices to share
resources is networking.
▪ Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet, instead
of leased lines to communicate .
Traditional Connectivity
Remote Access Virtual Private Network
Brief Overview of How it Works
▪ Two connections – one is made to the Internet and the
second is made to the VPN.
▪ Datagrams – contains data, destination and source
information.
▪ Firewalls – VPNs allow authorized users to pass through the
firewalls.
▪ Protocols – protocols create the VPN tunnels.
Four Critical Functions
▪ Authentication – validates that the data was sent from the
sender.
▪ Access control – limiting unauthorized users from
accessing the network.
▪ Confidentiality – preventing the data to be read or copied
as the data is being transported.
▪ Data Integrity – ensuring that the data has not been altered
Tunneling
▪ A virtual point-to-point connection made through a
public network. It transports encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram DataArea
Original Datagram
Data Encapsulation
Two types of end points:
 Remote Access
 Site-to-Site
Tunneling
▪ MostVPNs rely on tunneling to create a private network
that reaches across the Internet. Essentially, tunneling is
the process of placing an entire packet within another
packet and sending it over a network.
Tunneling requires three different protocols:
▪ Passenger protocol -The original data (IPX, IP) being
carried
▪ Encapsulating protocol -The protocol (GRE, IPSec, L2F,
PPTP, L2TP) that is wrapped around the original data
▪ Carrier protocol -The protocol used by the network that
the information is traveling over
Four Protocols used in VPN
▪ PPTP -- Point-to-Point Tunneling Protocol
▪ L2TP -- Layer 2 Tunneling Protocol
▪ IPsec -- Internet Protocol Security
▪ SOCKS – is not used as much as the ones above
VPN Topology : Type of VPNs
▪ Remote Access VPN
▪ Site-to-Site VPN
▪ Intranet VPN
▪ Extranet VPN
Remote AccessVPN
▪ Remote-access, called as virtual private dial-up network
(VPDN)
▪ LAN connection used by a company that has employees
who need to connect to the private network from various
remote locations.
▪ Remote-access VPNs permit secure encrypted
▪ connections between a company's private network.
Site-to-Site VPN
▪ Intranet-based - If a company has one or more remote locations
that they wish to join in a single private network, they can
create an intranet VPN to connect LAN to LAN.
▪ Extranet-based - When a company has a close relationship with
another company (for example, a partner, supplier or
customer), they can build an extranet VPN that connects LAN
to LAN, and that allows all of the various companies to work
in a shared environment.
VPN Security
▪ A well-designed VPN uses several methods for keeping your
connection and data secure:
▪ Firewalls
▪ Encryption
▪ IPSec
▪ You can set firewalls to restrict the number of open ports, what type of
packets are passed through and which protocols are allowed through.
VPN : Advantages
▪ Cost Savings .
▪ Extend geographic connectivity.
▪ Improve security
▪ Provide broadband networking compatibility
▪ Improve productivity
▪ Reliable
VPN : Disadvantages
▪ VPNs require an in-depth understanding of public network security
▪ VPN require more tools.
Applications
▪ Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care
provider
▪ Manufacturing: allow suppliers to view inventory & allow
clients to purchase online safely
▪ Retail: able to securely transfer sales data or customer info
between stores & the headquarters
▪ Banking/Financial: enables account information to be
transferred safely within departments & branches
▪ General Business: communication between remote
employees can be securely exchanged
Future OfVPN
▪ VPNs are continually being enhanced.
Example: Equant NV
▪ As the VPN market becomes larger, more applications
will be created along with more VPN providers and
new VPN types.
▪ Networks are expected to converge to create an
integrated VPN
▪ Improved protocols are expected, which will also
improve VPNs.
Future ofVPN: Companies withVPN
References:
▪ http://vpn.shmoo.com/
▪ http://www.uwsp.edu/it/vpn/
▪ http://info.lib.uh.edu/services/vpn.html
▪ http://www.cites.uiuc.edu/vpn/
▪ http://www.positivenetworks.net/images/client-
uploads/jumppage2.htm
All reference links have been checked so far and have been found running on 10-08-2013
References
▪ <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>
▪ Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007
<http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.
▪ Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works.
6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>.
▪ "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar.
2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.
All reference links have been checked so far and have been found running on 10-08-2013

More Related Content

What's hot

Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
r123027
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 

What's hot (20)

VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Tcp
TcpTcp
Tcp
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Ipv6
Ipv6Ipv6
Ipv6
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
HTTP/2 Changes Everything
HTTP/2 Changes EverythingHTTP/2 Changes Everything
HTTP/2 Changes Everything
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Cloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5GCloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5G
 

Similar to Vpn

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
Naim Latifi
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 

Similar to Vpn (20)

Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 

Recently uploaded

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 

Vpn

  • 2. Contents: ▪ Introduction:VPN ▪ Traditional Connectivity ▪ Remote Access Virtual Private Network ▪ Brief Overview of How it Works ▪ Four Critical Functions ▪ Tunneling ▪ Four Protocols used in VPN
  • 3. Contents: ▪ VPNTopology :Type ofVPNs ▪ Remote AccessVPN ▪ Site to siteVPN ▪ VPN Security ▪ VPN : Advantages ▪ VPN : Disadvantages ▪ Applications ▪ Future OfVPN ▪ References
  • 4. Introduction: VPN ▪ Linking of two or more computing devices to share resources is networking. ▪ Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate .
  • 6. Remote Access Virtual Private Network
  • 7. Brief Overview of How it Works ▪ Two connections – one is made to the Internet and the second is made to the VPN. ▪ Datagrams – contains data, destination and source information. ▪ Firewalls – VPNs allow authorized users to pass through the firewalls. ▪ Protocols – protocols create the VPN tunnels.
  • 8. Four Critical Functions ▪ Authentication – validates that the data was sent from the sender. ▪ Access control – limiting unauthorized users from accessing the network. ▪ Confidentiality – preventing the data to be read or copied as the data is being transported. ▪ Data Integrity – ensuring that the data has not been altered
  • 9. Tunneling ▪ A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram DataArea Original Datagram Data Encapsulation Two types of end points:  Remote Access  Site-to-Site
  • 10. Tunneling ▪ MostVPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. Tunneling requires three different protocols: ▪ Passenger protocol -The original data (IPX, IP) being carried ▪ Encapsulating protocol -The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data ▪ Carrier protocol -The protocol used by the network that the information is traveling over
  • 11. Four Protocols used in VPN ▪ PPTP -- Point-to-Point Tunneling Protocol ▪ L2TP -- Layer 2 Tunneling Protocol ▪ IPsec -- Internet Protocol Security ▪ SOCKS – is not used as much as the ones above
  • 12. VPN Topology : Type of VPNs ▪ Remote Access VPN ▪ Site-to-Site VPN ▪ Intranet VPN ▪ Extranet VPN
  • 13. Remote AccessVPN ▪ Remote-access, called as virtual private dial-up network (VPDN) ▪ LAN connection used by a company that has employees who need to connect to the private network from various remote locations. ▪ Remote-access VPNs permit secure encrypted ▪ connections between a company's private network.
  • 14.
  • 15. Site-to-Site VPN ▪ Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. ▪ Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 16.
  • 17.
  • 18. VPN Security ▪ A well-designed VPN uses several methods for keeping your connection and data secure: ▪ Firewalls ▪ Encryption ▪ IPSec ▪ You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.
  • 19. VPN : Advantages ▪ Cost Savings . ▪ Extend geographic connectivity. ▪ Improve security ▪ Provide broadband networking compatibility ▪ Improve productivity ▪ Reliable
  • 20. VPN : Disadvantages ▪ VPNs require an in-depth understanding of public network security ▪ VPN require more tools.
  • 21. Applications ▪ Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider ▪ Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely ▪ Retail: able to securely transfer sales data or customer info between stores & the headquarters ▪ Banking/Financial: enables account information to be transferred safely within departments & branches ▪ General Business: communication between remote employees can be securely exchanged
  • 22. Future OfVPN ▪ VPNs are continually being enhanced. Example: Equant NV ▪ As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. ▪ Networks are expected to converge to create an integrated VPN ▪ Improved protocols are expected, which will also improve VPNs.
  • 24. References: ▪ http://vpn.shmoo.com/ ▪ http://www.uwsp.edu/it/vpn/ ▪ http://info.lib.uh.edu/services/vpn.html ▪ http://www.cites.uiuc.edu/vpn/ ▪ http://www.positivenetworks.net/images/client- uploads/jumppage2.htm All reference links have been checked so far and have been found running on 10-08-2013
  • 25. References ▪ <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt> ▪ Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>. ▪ Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>. ▪ "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>. All reference links have been checked so far and have been found running on 10-08-2013