SlideShare a Scribd company logo
Virtual Private Network
(VPN)
SUBMITTED BY:
NAME : MRIDUL GUPTA
ROLL NO: 11901032
TECHNOLOGY: NETWORKING
COLLEGE : PUNJABI UNIVERSITY PATIALA
This Photo by Unknown author is licensed under CC BY.
Topics covered in project
1.INTRODUCTION
2.VPN
3.TYPES OF VPN
4.ROUTING PROTOCOL AND REDISTRIBUTION
5Creating WAN(wide area network)
6.VPN IMPLEMENTATION IN WAN
This Photo by Unknown author is licensed under CC BY-NC-ND.
INTRODUCTION
Virtual: Virtual means not real or in a different state of being. In a VPN, private communication
between two or more devices is achieved through a public network the Internet. Therefore, the
communication is virtually but not physically there.
Private: Private means to keep something a secret from the general public. Although those two
devices are communicating with each other in a public environment, there is no third party who
can interrupt this communication or receive any data that is exchanged between them.
Network: A network consists of two or more devices that can freely and electronically
communicate with each other via cables and wire. A VPN is a network. It can transmit
information over long distances effectively and efficiently.
What is VPN ?
Virtual Private Network, is defines a network that uses public network paths but
maintains
the security and protection of private networks. For example, Delta Company has
two
locations, one in Noida, New Delhi (A) and Pune, Mumbai (B). In order for both
locations
to communicate efficiently, Delta Company has the choice to set up private lines
between
the two locations. Although private lines would restrict public access and extend
the use of
their bandwidth, it will cost Delta Company a great deal of money since they
would have to
purchase the communication lines per mile. The more viable option is to
implement a VPN.
Delta Company can hook their communication lines with a local ISP in both cities
would act as a middleman, connecting the two locations. This would create an affordable
small area network for Delta Company.
Types of VPN
1.REMOTE ACESS VPN: Enable remote connectivity using any Internet access technology.
The remote user launches the VPN client to create a VPN tunnel to the gateway.
2.Site to Site VPN:
I).INTRANET VPN: If a company has one or more remote locations that they wish to join in
a single private network, they can create an intranet VPN to connect LAN to LAN.
ii).EXTRANET VPN: When a company has a close relationship with another
company (for example, a partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that allows all of the various
companies to work in a shared environment.
ROUTING
PROTOCOL
Routing Protocols are the set of defined rules used by
the routers to communicate between source &
destination.
Router protocols include:
• Routing Information Protocol (RIP)
• Interior Gateway Routing Protocol (IGRP)
• Open Shortest Path First (OSPF)
FOR WAN :
WE NEED REDISTRIBUTION BETWEEN
NETWORKS SO THAT DIFFERENT ROUTING
PROTOCOLS COMMUNICATE WITH EACH OTHER.
Wide area
network (WAN)
• A WAN could be a connection of LAN connecting to other LANs &MAN's.
• A LAN can span to a building or campus. And a MAN span over a city but
• A WAN can span sites in multiple cities, countries and continents.
• WANs are not restricted to the same geographical location as a LAN would be. A
LAN can be set up in any number of geographical areas and be connected to a WAN—
meaning a WAN is not constrained to one specific location.
• A virtual private network facilitates connectivity and security between WAN sites.
Different VPNs can be utilized for different use cases.
VPN -Implementation
AS we discussed that VPN creates a
secret tunnel between source
and destination so ,to create
that tunnel we
need these commands .
FOR SOURCE ROUTER:
Int tunnel 1
Ip add 100.0.0.1 255.0.0.0
Tunnel source se0/0/0
Tunnel destination 14.0.0.2
FOR DESTINATION ROUTER:
Int tunnel 1
Ip add 100.0.0.2 255.0.0.0
Tunnel source se0/1/0
Tunnel destination 10.0.0.1
THANK YOU
This Photo by Unknown author is licensed under CC BY-NC.

More Related Content

Similar to AWS VPC .pptx

Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
Nicole Gomez
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAVSAHU55
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
NarcisIlie1
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
Subrata Kumer Paul
 
F0322038042
F0322038042F0322038042
F0322038042
inventionjournals
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Ayano Midakso
 
What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdf
EIHEducation
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
Jigar Navadiya
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
karthikvcyber
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
Bhavesh Goswami
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
Bhavesh Goswami
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
sonalikasingh15
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
Subhasis Nayak
 

Similar to AWS VPC .pptx (20)

Vpn
VpnVpn
Vpn
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
F0322038042
F0322038042F0322038042
F0322038042
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
What is a VPN 1.pdf
What is a VPN 1.pdfWhat is a VPN 1.pdf
What is a VPN 1.pdf
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
V P N
V P NV P N
V P N
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 

AWS VPC .pptx

  • 1. Virtual Private Network (VPN) SUBMITTED BY: NAME : MRIDUL GUPTA ROLL NO: 11901032 TECHNOLOGY: NETWORKING COLLEGE : PUNJABI UNIVERSITY PATIALA This Photo by Unknown author is licensed under CC BY.
  • 2. Topics covered in project 1.INTRODUCTION 2.VPN 3.TYPES OF VPN 4.ROUTING PROTOCOL AND REDISTRIBUTION 5Creating WAN(wide area network) 6.VPN IMPLEMENTATION IN WAN This Photo by Unknown author is licensed under CC BY-NC-ND.
  • 3. INTRODUCTION Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private: Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network: A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
  • 4. What is VPN ? Virtual Private Network, is defines a network that uses public network paths but maintains the security and protection of private networks. For example, Delta Company has two locations, one in Noida, New Delhi (A) and Pune, Mumbai (B). In order for both locations to communicate efficiently, Delta Company has the choice to set up private lines between the two locations. Although private lines would restrict public access and extend the use of their bandwidth, it will cost Delta Company a great deal of money since they would have to purchase the communication lines per mile. The more viable option is to implement a VPN. Delta Company can hook their communication lines with a local ISP in both cities would act as a middleman, connecting the two locations. This would create an affordable small area network for Delta Company.
  • 5. Types of VPN 1.REMOTE ACESS VPN: Enable remote connectivity using any Internet access technology. The remote user launches the VPN client to create a VPN tunnel to the gateway. 2.Site to Site VPN: I).INTRANET VPN: If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. ii).EXTRANET VPN: When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 6. ROUTING PROTOCOL Routing Protocols are the set of defined rules used by the routers to communicate between source & destination. Router protocols include: • Routing Information Protocol (RIP) • Interior Gateway Routing Protocol (IGRP) • Open Shortest Path First (OSPF) FOR WAN : WE NEED REDISTRIBUTION BETWEEN NETWORKS SO THAT DIFFERENT ROUTING PROTOCOLS COMMUNICATE WITH EACH OTHER.
  • 7. Wide area network (WAN) • A WAN could be a connection of LAN connecting to other LANs &MAN's. • A LAN can span to a building or campus. And a MAN span over a city but • A WAN can span sites in multiple cities, countries and continents. • WANs are not restricted to the same geographical location as a LAN would be. A LAN can be set up in any number of geographical areas and be connected to a WAN— meaning a WAN is not constrained to one specific location. • A virtual private network facilitates connectivity and security between WAN sites. Different VPNs can be utilized for different use cases.
  • 8. VPN -Implementation AS we discussed that VPN creates a secret tunnel between source and destination so ,to create that tunnel we need these commands . FOR SOURCE ROUTER: Int tunnel 1 Ip add 100.0.0.1 255.0.0.0 Tunnel source se0/0/0 Tunnel destination 14.0.0.2 FOR DESTINATION ROUTER: Int tunnel 1 Ip add 100.0.0.2 255.0.0.0 Tunnel source se0/1/0 Tunnel destination 10.0.0.1
  • 9.
  • 10. THANK YOU This Photo by Unknown author is licensed under CC BY-NC.