SlideShare a Scribd company logo
1 of 27
VPN:
Virtual Private Network
Presented By:
Gregg Dowdy
Liz Farricker
Whitney Mayoras
Outline







Introductions
What is it?
Overview
Security/Tunneling
Advantages and Disadvantages
Demonstration
Introductions


Gregg





Liz






BSG – Student Developer
Unified Western Grocers – Retail Technology
Specialist
BSG – Business Analyst
ResNet – Network Technician
COB CRC: Tier 2/3 Support Technician

Whitney


BSG – Student Tester/Analyst
VPN: What is it?







Virtual Private Network
Remote network communication through
Internet
Used by companies/organizations who want
to communicate confidentially
Two parts:



Protected or “inside” network
“Outside” network or segment (less trustworthy)
VPN: Types


Secure VPNs use cryptographic
tunneling protocols.




IPsec, SSL/TLS, OpenVPN, PPTP, L2TP,
L2TPv3, VPN-Q and MPVPN

Trusted VPNs rely on the security of a
single provider’s network to protect the
traffic.


MPLS and L2F
VPN: Security




Encryption
IPSec
Authentication



User/System and Data
AAA Servers
(Authentication, Authorization, and Accounting)



Firewalls
VPN: Tunneling


Requires 3 protocols


Carrier




Passenger




Default network protocol
Original data

Encapsulation


GRE, IPSec, L2F, PPTP, L2TP
VPN: Encapsulation

Figure 1
VPN: Tunneling (cont.)


Two Basic types of tunneling


Site-to-Site




Typically uses GRE

Remote-Access


Typically uses PPP
VPN: Advantages






Cost Effective
Greater scalability
Easy to add/remove users
Mobility
Security
VPN: Disadvantages




Understanding of security issues
Unpredictable Internet traffic
Difficult to accommodate products
from different vendors
VPN Demonstration
Click on Start –
select Network
Connections
VPN Demonstration
In Network
Connections on
the left hand side
there is a link to
“Create New
Connection” –
click on this and a
wizard will pop up
assisting the user
VPN Demonstration
Select
“Connect to the
Network at my
Workplace”
VPN Demonstration
Select “Virtual
Private
Network
Connection”
VPN Demonstration
Make a name for
this connection that
you are establishing
– to distinguish this
connection from
other VPN
connections that
might already be
established
VPN Demonstration
For this demonstration I
am trying to connect to
my wireless router off
campus therefore the IP
address that I insert is
the IP address for my
router which I can find
out by running an
ipconfig and it is the IP
address for your default
gateway
NOTE: Not all routers
will allow users to VPN
into it
VPN Demonstration
Personal
preference as to
whether or not you
want other users to
be able to use this
VPN connection on
this computer
VPN Demonstration
VPN Demonstration
VPN Demonstration
This is a profile
(username and
password) that has
already been created on
your router – which can
be created by typing in
the IP address of your
router in a web browser
VPN Demonstration
VPN Demonstration

In Start – Run insert the IP
address of the computer that
you want to access that is
connected to the router
VPN Demonstration
Using the same
username and password
already established for
the router you can
connect to this specific
computer
VPN Demonstration

These are only the files that are “shared” on this computer
How to Connect to OSU:







How to connect to OSU:
Dave Sullivan made a helpful Tutorial
First on the Engineering Website you have to download
the Cisco VPN Client
One must acquire authorization information prior to
using the VPN service
Once registration is complete you download the
appropriate client depending on your operating system;
and follow the steps to complete the connection
References


[Figure 1]

<www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>


Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar.
2007
<http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.



Tyson, Jeff. "How Virtual Private Networks Work." How Stuff
Works. 6 Mar. 2007
<http://computer.howstuffworks.com/vpn.htm>.



"Virtual Private Network." Wikipedia: the Free Encyclopedia. 6
Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.

More Related Content

What's hot

12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
Naim Latifi
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
802 11 3
802 11 3802 11 3
802 11 3
rphelps
 
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
gainspan
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
jadeja dhanraj
 

What's hot (19)

12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
V P N
V P NV P N
V P N
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Wireless authentication
Wireless authenticationWireless authentication
Wireless authentication
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
802 11 3
802 11 3802 11 3
802 11 3
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 

Similar to Vpn 3 13_07

csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
Kunal Sharma
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
Bibekananada Jena
 

Similar to Vpn 3 13_07 (20)

Ch11 Vpn
Ch11 VpnCh11 Vpn
Ch11 Vpn
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Vpn
VpnVpn
Vpn
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
The vpn
The vpnThe vpn
The vpn
 
VPN
VPNVPN
VPN
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
 
Vpn
Vpn Vpn
Vpn
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Vpn 3 13_07