Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Virtual Private Network VPN

1,069 views

Published on

Virtual Private Network VPN

Published in: Technology
  • Be the first to comment

Virtual Private Network VPN

  1. 1. VPN: Virtual Private Network Advanced networks
  2. 2. What is VPN? A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network. 4/3/2015 2
  3. 3. What is VPN? In the virtual network, the link layer protocols are tunneled through the larger network. VPNs provide secure communications over the shared public network, which is the Internet. They are also used for separating IP traffic over the network using security features. By using a VPN, users can access a network through a different IP address other than the one connecting their computers and the Internet. In virtual private networking, there is a private network configured within a shared public network to avail of the benefits enjoyed by large networks. 4/3/2015 3
  4. 4. 4/3/2015 4
  5. 5. Brief Overview of How it Works oTwo connections – one is made to the Internet and the second is made to the VPN. oDatagrams – contains data, destination and source information. oFirewalls – VPNs allow authorized users to pass through the firewalls. oProtocols – protocols create the VPN tunnels. 4/3/2015 5
  6. 6. Four Critical Functions oAuthentication – validates that the data was sent from the sender. oAccess control – limiting unauthorized users from accessing the network. oConfidentiality – preventing the data to be read or copied as the data is being transported. oData Integrity – ensuring that the data has not been altered 4/3/2015 6
  7. 7. Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] 4/3/2015 7
  8. 8. 4/3/2015 8
  9. 9. Four Protocols used in VPN 1. PPTP -- Point-to-Point Tunneling Protocol Used to connect a remote client to a private server over the Internet. 2. L2TP -- Layer 2 Tunneling Protocol Used to tunnel data communications traffic between two sites over the Internet. 3. IPsec -- Internet Protocol Security Used to secure communications over the Internet. 4. SSL and TLS -- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over the4/3/2015 9
  10. 10. 4/3/2015 10

×