SlideShare a Scribd company logo
1 of 15
CChhaapptteerr 2266 
VViirrttuuaall PPrriivvaattee NNeettwwoorrkkss aanndd 
NNeettwwoorrkk AAddddrreessss TTrraannssllaattiioonn 
Objectives 
Upon completion you will be able to: 
• Understand the difference between an internet and an extranet 
• Understand private, hybrid, and virtual private networks 
• Understand how VPN can guarantee privacy 
• Understand the mechanism of NAT 
TCP/IP Protocol Suite 1
26.1 PRIVATE NETWORKS 
A private network is designed to be used only inside aann oorrggaanniizzaattiioonn.. IItt 
aalllloowwss aacccceessss ttoo sshhaarreedd rreessoouurrcceess aanndd,, aatt tthhee ssaammee ttiimmee,, pprroovviiddeess 
pprriivvaaccyy.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
IInnttrraanneett 
EExxttrraanneett 
AAddddrreessssiinngg 
TCP/IP Protocol Suite 2
TTaabbllee 2266..11 AAddddrreesssseess ffoorr pprriivvaattee nneettwwoorrkkss 
TCP/IP Protocol Suite 3
26.2 VIRTUAL PRIVATE 
NETWORKS (VPN) 
Virtual private network (VPN) is a technology ffoorr llaarrggee oorrggaanniizzaattiioonnss 
tthhaatt uussee tthhee gglloobbaall IInntteerrnneett ffoorr bbootthh iinnttrraa-- aanndd iinntteerroorrggaanniizzaattiioonn 
ccoommmmuunniiccaattiioonn,, bbuutt rreeqquuiirree pprriivvaaccyy iinn tthheeiirr iinnttrraaoorrggaanniizzaattiioonn 
ccoommmmuunniiccaattiioonn.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
AAcchhiieevviinngg PPrriivvaaccyy 
VVPPNN TTeecchhnnoollooggyy 
TCP/IP Protocol Suite 4
Figure 26.1 Private network 
TCP/IP Protocol Suite 5
Figure 26.2 Hybrid network 
TCP/IP Protocol Suite 6
Figure 26.3 Virtual private network 
TCP/IP Protocol Suite 7
Figure 26.4 Tunneling 
TCP/IP Protocol Suite 8
Figure 26.5 Addressing in a VPN 
TCP/IP Protocol Suite 9
26.3 NETWORK ADDRESS 
TRANSLATION (NAT) 
Network address translation (NAT) allows a site to uussee aa sseett ooff pprriivvaattee 
aaddddrreesssseess ffoorr iinntteerrnnaall ccoommmmuunniiccaattiioonn aanndd aa sseett ooff gglloobbaall IInntteerrnneett 
aaddddrreesssseess ffoorr ccoommmmuunniiccaattiioonn wwiitthh aannootthheerr ssiittee.. TThhee ssiittee mmuusstt hhaavvee oonnllyy 
oonnee ssiinnggllee ccoonnnneeccttiioonn ttoo tthhee gglloobbaall IInntteerrnneett tthhrroouugghh aa rroouutteerr tthhaatt rruunnss 
NNAATT ssooffttwwaarree.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
AAddddrreessss TTrraannssllaattiioonn 
TTrraannssllaattiioonn TTaabbllee 
NNAATT aanndd IISSPP 
TCP/IP Protocol Suite 10
Figure 26.6 NAT 
TCP/IP Protocol Suite 11
Figure 26.7 Address translation 
TCP/IP Protocol Suite 12
Figure 26.8 Translation 
TCP/IP Protocol Suite 13
TTaabbllee 2266..22 FFiivvee--ccoolluummnn ttrraannssllaattiioonn ttaabbllee 
TCP/IP Protocol Suite 14
Figure 26.9 An ISP and NAT 
TCP/IP Protocol Suite 15

More Related Content

Viewers also liked

Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State UniversityVideoguy
 
Présentation ip over atm
Présentation ip over atmPrésentation ip over atm
Présentation ip over atmSyfeddine OIHI
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classflessNoctorous Jamal
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialMohamed Loey
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classfulNoctorous Jamal
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 

Viewers also liked (20)

Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Chap 24 mobile ip
Chap 24 mobile ipChap 24 mobile ip
Chap 24 mobile ip
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftp
 
Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
 
Présentation ip over atm
Présentation ip over atmPrésentation ip over atm
Présentation ip over atm
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Chap 08 ip
Chap 08 ipChap 08 ip
Chap 08 ip
 
Chap 11 udp
Chap 11 udpChap 11 udp
Chap 11 udp
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 

More from Noctorous Jamal

Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocolNoctorous Jamal
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsNoctorous Jamal
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm SlidesNoctorous Jamal
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm SlidesNoctorous Jamal
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm SlidesNoctorous Jamal
 

More from Noctorous Jamal (7)

Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Chap 07 arp & rarp
Chap 07 arp & rarpChap 07 arp & rarp
Chap 07 arp & rarp
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm Slides
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm Slides
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm Slides
 

Chap 26 vpn

  • 1. CChhaapptteerr 2266 VViirrttuuaall PPrriivvaattee NNeettwwoorrkkss aanndd NNeettwwoorrkk AAddddrreessss TTrraannssllaattiioonn Objectives Upon completion you will be able to: • Understand the difference between an internet and an extranet • Understand private, hybrid, and virtual private networks • Understand how VPN can guarantee privacy • Understand the mechanism of NAT TCP/IP Protocol Suite 1
  • 2. 26.1 PRIVATE NETWORKS A private network is designed to be used only inside aann oorrggaanniizzaattiioonn.. IItt aalllloowwss aacccceessss ttoo sshhaarreedd rreessoouurrcceess aanndd,, aatt tthhee ssaammee ttiimmee,, pprroovviiddeess pprriivvaaccyy.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: IInnttrraanneett EExxttrraanneett AAddddrreessssiinngg TCP/IP Protocol Suite 2
  • 3. TTaabbllee 2266..11 AAddddrreesssseess ffoorr pprriivvaattee nneettwwoorrkkss TCP/IP Protocol Suite 3
  • 4. 26.2 VIRTUAL PRIVATE NETWORKS (VPN) Virtual private network (VPN) is a technology ffoorr llaarrggee oorrggaanniizzaattiioonnss tthhaatt uussee tthhee gglloobbaall IInntteerrnneett ffoorr bbootthh iinnttrraa-- aanndd iinntteerroorrggaanniizzaattiioonn ccoommmmuunniiccaattiioonn,, bbuutt rreeqquuiirree pprriivvaaccyy iinn tthheeiirr iinnttrraaoorrggaanniizzaattiioonn ccoommmmuunniiccaattiioonn.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: AAcchhiieevviinngg PPrriivvaaccyy VVPPNN TTeecchhnnoollooggyy TCP/IP Protocol Suite 4
  • 5. Figure 26.1 Private network TCP/IP Protocol Suite 5
  • 6. Figure 26.2 Hybrid network TCP/IP Protocol Suite 6
  • 7. Figure 26.3 Virtual private network TCP/IP Protocol Suite 7
  • 8. Figure 26.4 Tunneling TCP/IP Protocol Suite 8
  • 9. Figure 26.5 Addressing in a VPN TCP/IP Protocol Suite 9
  • 10. 26.3 NETWORK ADDRESS TRANSLATION (NAT) Network address translation (NAT) allows a site to uussee aa sseett ooff pprriivvaattee aaddddrreesssseess ffoorr iinntteerrnnaall ccoommmmuunniiccaattiioonn aanndd aa sseett ooff gglloobbaall IInntteerrnneett aaddddrreesssseess ffoorr ccoommmmuunniiccaattiioonn wwiitthh aannootthheerr ssiittee.. TThhee ssiittee mmuusstt hhaavvee oonnllyy oonnee ssiinnggllee ccoonnnneeccttiioonn ttoo tthhee gglloobbaall IInntteerrnneett tthhrroouugghh aa rroouutteerr tthhaatt rruunnss NNAATT ssooffttwwaarree.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: AAddddrreessss TTrraannssllaattiioonn TTrraannssllaattiioonn TTaabbllee NNAATT aanndd IISSPP TCP/IP Protocol Suite 10
  • 11. Figure 26.6 NAT TCP/IP Protocol Suite 11
  • 12. Figure 26.7 Address translation TCP/IP Protocol Suite 12
  • 13. Figure 26.8 Translation TCP/IP Protocol Suite 13
  • 14. TTaabbllee 2266..22 FFiivvee--ccoolluummnn ttrraannssllaattiioonn ttaabbllee TCP/IP Protocol Suite 14
  • 15. Figure 26.9 An ISP and NAT TCP/IP Protocol Suite 15