SlideShare a Scribd company logo
1 of 20
Download to read offline
By Divam Goel
What is a VPN?
A virtual network overlaid on top of the
ubiquitous interconnection of the Internet
and a private network for confidential
communications and exclusive usage.
VPNs
In a virtual private network (VPN), "virtual"
implies that there is no physical network
infrastructure dedicated to the private network.
Instead, a single physical network infrastructure
is shared among various logical networks
In VPNs, various networking technologies are
applied toward the goal of providing private
communications within the public Internet
infrastructure
Private Networks

Separate Private Networks.
Why VPNs?
Separate private networking solutions are
expensive and cannot be updated quickly
to adapt to changes in business
requirements.
The Internet is inexpensive but does not
by itself ensure privacy.
The Internet

Virtual Private Networking: the collection of

technologies applied to a public network
—the Internet—to provide solutions for
private networking needs.
VPN

Motivation

Ubiquitous Coverage - wider coverage
compared with the private data network
infrastructures offered by
telecommunication providers
Cost Reduction - based on the system's
economy of scale
Security – using cryptographic technology
E-Commerce - VPNs provide both
interconnectivity and security.
The VPN MarketPlace
VPN Products: Hardware and Software that make
VPNs possible
– A VPN gateway is a stand-alone device that
enables authorized access to the protected
network resources. The resources are not
located on the same physical device with
the VPN gateway
– A VPN client, on the other hand, is installed
on the same network device it is supposed
to protect. Usually, the client is a software
package installed on the host computer.
The VPN MarketPlace
VPN SERVICES:
– Contracted VPN service
– Service level agreements (SLAs)
VPN

Barriers

Lack of interoperability of IPSec*
implementations.
????????
Lack of widely used quality of service (QoS)
standards, as well as the sparse
deployment of QoS-capable infrastructures
Security services in support of VPNs must
be constructed from additional hardware
and software components as Internet
infrastructure is still largely focused on
providing connectivity and does not yet
offer services beyond connectivity.
*IPSec: Internet Security standards established by IAB
VPN Technologies

 Tunneling – using encapsulation
 Authentication
 Access Control
 Data Security
VPN Solutions
VPN solution consists of multiple, appropriately
configured VPN devices that are placed in the
appropriate locations within the network.
VPN Gateway Interface

The VPN client is software used for remote
access for a single computer or user.
VPN Network and Service Management.
VPN Vendors
Layer 2 Tunneling Protocol (L2TP): utilizing Cisco
Systems” Layer-2 Forwarding and Microsoft’s
Point-o-Point Tunneling Protocol (PPTP)
– Supports IP, IPX, AppleTalk, frame relay, ATM,
S.25 and Sonet
IBM Nways Multiprotocol Routing Services (MRS),
Nways Multiprotocol Access Services(MAS) and
Access Integration Services(AIS)
– Supports IP, APPN,TN3270
And there are many more………
Types of VPNs
Site to Site VPNs
– Using ISDN, Frame Relay or ATM
– Designed to replace a WAN

Remote Access VPNs
– Using the Internet
– Provide remote access to mobile or branch
employees
Site-to-Site VPN
VPNs Based on ISDN, Frame Relay or ATM
Site-to-Site VPN vs WAN
Remote Access VPN
VPNs Based on IP Tunnels/
Internet VPNs
What are the costs?

Cost Savings $$

Monthly Cost Savings for Site-to-Site
VPN
800000
700000
600000
500000
400000
300000
200000
100000
0

678255

134055
0
0

2000

4000

6000

Using the Cisco
website
calculator a
comparison of
three scenarios
was made.
Not for small
enterprises!!

Number of users

*
www.cisco.com/warp/public/779/largeent/learn/technologies/vpn/site2site.html
VPN

Directions

Integration of VPN and firewall functions into a
single device.
Incorporating routing and quality of service
features into the VPN device will make it even
more versatile and more attractive to businesses.
Adding intelligence to the network – Currently the
routers and switches merely forward the packets
without knowing what is inside them or how to
process them accordingly. ??
Questions?????

More Related Content

What's hot

my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpnAreeba Gill
 
Zigbee technology and its application in
Zigbee technology and its application inZigbee technology and its application in
Zigbee technology and its application inIJCNCJournal
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Zigbee abstract
Zigbee abstractZigbee abstract
Zigbee abstractKadaSuraj
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Sensor(zigbee)
Sensor(zigbee)Sensor(zigbee)
Sensor(zigbee)rajrayala
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 

What's hot (20)

my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Zigbee technology and its application in
Zigbee technology and its application inZigbee technology and its application in
Zigbee technology and its application in
 
Zigbee
ZigbeeZigbee
Zigbee
 
VPN
VPNVPN
VPN
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Zigbee abstract
Zigbee abstractZigbee abstract
Zigbee abstract
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Dccn ppt
Dccn pptDccn ppt
Dccn ppt
 
Sensor(zigbee)
Sensor(zigbee)Sensor(zigbee)
Sensor(zigbee)
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 

Viewers also liked

Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley Incisive_Events
 
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom CraneManaging Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom CraneIncisive_Events
 
The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard Incisive_Events
 
Social Business - Alpesh Doshi
Social Business - Alpesh DoshiSocial Business - Alpesh Doshi
Social Business - Alpesh DoshiIncisive_Events
 
Influence and Leadership - Simon Edwards
Influence and Leadership - Simon EdwardsInfluence and Leadership - Simon Edwards
Influence and Leadership - Simon EdwardsIncisive_Events
 
James Andrews User Engagement
James Andrews User EngagementJames Andrews User Engagement
James Andrews User EngagementIncisive_Events
 

Viewers also liked (7)

Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley Changing Our Attitudes to Search - Phil Bradley
Changing Our Attitudes to Search - Phil Bradley
 
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom CraneManaging Eresources and Digitalization - Robert Kiley, Tom Crane
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
 
The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard The Future of the Internet, Commerce and Communications - Gerd Leonhard
The Future of the Internet, Commerce and Communications - Gerd Leonhard
 
Rachel Green Jove
Rachel Green JoveRachel Green Jove
Rachel Green Jove
 
Social Business - Alpesh Doshi
Social Business - Alpesh DoshiSocial Business - Alpesh Doshi
Social Business - Alpesh Doshi
 
Influence and Leadership - Simon Edwards
Influence and Leadership - Simon EdwardsInfluence and Leadership - Simon Edwards
Influence and Leadership - Simon Edwards
 
James Andrews User Engagement
James Andrews User EngagementJames Andrews User Engagement
James Andrews User Engagement
 

Similar to Virtual Private Networks

VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppttahaniali27
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .pptshanbelayayu
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptmocec17097
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPNNaim Latifi
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 

Similar to Virtual Private Networks (20)

VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .ppt
 
VPN mean .ppt
VPN mean .pptVPN mean .ppt
VPN mean .ppt
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vpn
VpnVpn
Vpn
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 

More from Divam Goyal

More from Divam Goyal (20)

How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
 
Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
 
Technology
TechnologyTechnology
Technology
 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
 
Blade server
Blade serverBlade server
Blade server
 
SOPA
SOPASOPA
SOPA
 
Steganography
SteganographySteganography
Steganography
 
Input device
Input deviceInput device
Input device
 
New energy resources
New energy resourcesNew energy resources
New energy resources
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Operating System
Operating SystemOperating System
Operating System
 
Inflection
InflectionInflection
Inflection
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Steganography
SteganographySteganography
Steganography
 
Biometrics
Biometrics Biometrics
Biometrics
 
Big bazaar
Big bazaarBig bazaar
Big bazaar
 
Brain rules
Brain rulesBrain rules
Brain rules
 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat Singh
 
Apple
AppleApple
Apple
 

Virtual Private Networks

  • 2. What is a VPN? A virtual network overlaid on top of the ubiquitous interconnection of the Internet and a private network for confidential communications and exclusive usage.
  • 3. VPNs In a virtual private network (VPN), "virtual" implies that there is no physical network infrastructure dedicated to the private network. Instead, a single physical network infrastructure is shared among various logical networks In VPNs, various networking technologies are applied toward the goal of providing private communications within the public Internet infrastructure
  • 5. Why VPNs? Separate private networking solutions are expensive and cannot be updated quickly to adapt to changes in business requirements. The Internet is inexpensive but does not by itself ensure privacy.
  • 6. The Internet Virtual Private Networking: the collection of technologies applied to a public network —the Internet—to provide solutions for private networking needs.
  • 7. VPN Motivation Ubiquitous Coverage - wider coverage compared with the private data network infrastructures offered by telecommunication providers Cost Reduction - based on the system's economy of scale Security – using cryptographic technology E-Commerce - VPNs provide both interconnectivity and security.
  • 8. The VPN MarketPlace VPN Products: Hardware and Software that make VPNs possible – A VPN gateway is a stand-alone device that enables authorized access to the protected network resources. The resources are not located on the same physical device with the VPN gateway – A VPN client, on the other hand, is installed on the same network device it is supposed to protect. Usually, the client is a software package installed on the host computer.
  • 9. The VPN MarketPlace VPN SERVICES: – Contracted VPN service – Service level agreements (SLAs)
  • 10. VPN Barriers Lack of interoperability of IPSec* implementations. ???????? Lack of widely used quality of service (QoS) standards, as well as the sparse deployment of QoS-capable infrastructures Security services in support of VPNs must be constructed from additional hardware and software components as Internet infrastructure is still largely focused on providing connectivity and does not yet offer services beyond connectivity. *IPSec: Internet Security standards established by IAB
  • 11. VPN Technologies  Tunneling – using encapsulation  Authentication  Access Control  Data Security
  • 12. VPN Solutions VPN solution consists of multiple, appropriately configured VPN devices that are placed in the appropriate locations within the network. VPN Gateway Interface The VPN client is software used for remote access for a single computer or user. VPN Network and Service Management.
  • 13. VPN Vendors Layer 2 Tunneling Protocol (L2TP): utilizing Cisco Systems” Layer-2 Forwarding and Microsoft’s Point-o-Point Tunneling Protocol (PPTP) – Supports IP, IPX, AppleTalk, frame relay, ATM, S.25 and Sonet IBM Nways Multiprotocol Routing Services (MRS), Nways Multiprotocol Access Services(MAS) and Access Integration Services(AIS) – Supports IP, APPN,TN3270 And there are many more………
  • 14. Types of VPNs Site to Site VPNs – Using ISDN, Frame Relay or ATM – Designed to replace a WAN Remote Access VPNs – Using the Internet – Provide remote access to mobile or branch employees
  • 15. Site-to-Site VPN VPNs Based on ISDN, Frame Relay or ATM
  • 17. Remote Access VPN VPNs Based on IP Tunnels/ Internet VPNs
  • 18. What are the costs? Cost Savings $$ Monthly Cost Savings for Site-to-Site VPN 800000 700000 600000 500000 400000 300000 200000 100000 0 678255 134055 0 0 2000 4000 6000 Using the Cisco website calculator a comparison of three scenarios was made. Not for small enterprises!! Number of users * www.cisco.com/warp/public/779/largeent/learn/technologies/vpn/site2site.html
  • 19. VPN Directions Integration of VPN and firewall functions into a single device. Incorporating routing and quality of service features into the VPN device will make it even more versatile and more attractive to businesses. Adding intelligence to the network – Currently the routers and switches merely forward the packets without knowing what is inside them or how to process them accordingly. ??