Published on

1 Comment
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. VPN’s Virtual Private Networks
  2. 2. What is a virtual private network (VPN)? <ul><li>A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. </li></ul><ul><li>A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. </li></ul><ul><li>The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. </li></ul>
  3. 3. <ul><li>A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocol s. </li></ul><ul><ul><li>In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a &quot;tunnel&quot; that cannot be &quot;entered&quot; by data that is not properly encrypted. </li></ul></ul><ul><ul><li>An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses. </li></ul></ul>
  4. 5. Benefits of VPN <ul><li>Extend geographic connectivity </li></ul><ul><li>Improve security </li></ul><ul><li>Reduce operational costs versus traditional WAN </li></ul><ul><li>Reduce transit time and transportation costs for remote users </li></ul><ul><li>Improve productivity </li></ul><ul><li>Simplify network topology </li></ul><ul><li>Provide global networking opportunities </li></ul><ul><li>Provide telecommuter support </li></ul>
  5. 6. Three types of VPN <ul><li>Remote-Access VPN </li></ul><ul><li>Site-to-Site VPN </li></ul><ul><ul><li>Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. </li></ul></ul><ul><ul><li>Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment. </li></ul></ul>
  6. 8. VPN Security <ul><li>A well-designed VPN uses several methods for keeping your connection and data secure: </li></ul><ul><ul><li>Firewalls </li></ul></ul><ul><ul><li>Encryption </li></ul></ul><ul><ul><li>IPSec </li></ul></ul><ul><ul><li>AAA Server </li></ul></ul>
  7. 9. VPN Security <ul><li>Firewalls </li></ul><ul><ul><li>provides a strong barrier between your private network and the Internet. </li></ul></ul><ul><ul><li>You can set firewalls to restrict the number of open ports, </li></ul></ul><ul><ul><li>what type of packets are passed through and which protocols are allowed through </li></ul></ul><ul><li>Encryption </li></ul><ul><ul><li>process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode </li></ul></ul>
  8. 10. VPN Security <ul><li>IPSec </li></ul><ul><ul><li>Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication </li></ul></ul><ul><li>AAA Server (authentication, authorization and accounting) used for more secure access in a remote-access VPN environment </li></ul><ul><ul><li>Who you are (authentication) </li></ul></ul><ul><ul><li>What you are allowed to do (authorization) </li></ul></ul><ul><ul><li>What you actually do (accounting) </li></ul></ul>
  9. 11. Tunneling <ul><li>VPN </li></ul><ul><ul><li>private communications channel(tunnel) </li></ul></ul><ul><ul><li>Encrypted </li></ul></ul><ul><ul><li>Can be accessed only by those parties with appropriate encryption and decryption keys </li></ul></ul>