SlideShare a Scribd company logo
By – K.Darshana Viduranga – 54
HNDIT -2nd
year
What is a VPN?What is a VPN?
 Virtual Private Network is aVirtual Private Network is a
type of private network thattype of private network that
uses publicuses public
telecommunication, such astelecommunication, such as
the Internet, instead of leasedthe Internet, instead of leased
lines to communicate.lines to communicate.
 Became popular as moreBecame popular as more
employees worked in remoteemployees worked in remote
locations.locations.
What is a VPN? (Cont.)What is a VPN? (Cont.)
 A VPN can be created by connectingA VPN can be created by connecting
offices and single users (including mobileoffices and single users (including mobile
users) to the nearest service providers POPusers) to the nearest service providers POP
(Point of Presence) and using that service(Point of Presence) and using that service
provider’s backbone network, or even theprovider’s backbone network, or even the
Internet, as the tunnel between officesInternet, as the tunnel between offices
 A VPN includes authentication andA VPN includes authentication and
encryption to protect data integrity andencryption to protect data integrity and
confidentialityconfidentiality
Who uses VPN’s?Who uses VPN’s?
 VPN’s can be found in homes, workplaces, orVPN’s can be found in homes, workplaces, or
anywhere else as long as an ISP (Internet Serviceanywhere else as long as an ISP (Internet Service
Provider) is available.Provider) is available.
 VPN’s allow company employees who travelVPN’s allow company employees who travel
often or who are outside their companyoften or who are outside their company
headquarters to safely and securely connect toheadquarters to safely and securely connect to
their company’s Intranettheir company’s Intranet
Types of VPNTypes of VPN
 Remote-Access VPNRemote-Access VPN
 Site-to-Site VPNSite-to-Site VPN
Remote-Access VPNRemote-Access VPN
 Remote-accessRemote-access, also called a, also called a virtual private dial-virtual private dial-
up networkup network ((VPDNVPDN), is a user-to-LAN), is a user-to-LAN
connection used by a company that has employeesconnection used by a company that has employees
who need to connect to the private network fromwho need to connect to the private network from
various remote locations.various remote locations.
 A good example of a company that needs aA good example of a company that needs a
remote-access VPN would be a large firm withremote-access VPN would be a large firm with
hundreds of sales people in the field.hundreds of sales people in the field.
 Remote-access VPNs permit secure, encryptedRemote-access VPNs permit secure, encrypted
connections between a company's private networkconnections between a company's private network
and remote users through a third-party serviceand remote users through a third-party service
provider.provider.
Site-to-Site VPNSite-to-Site VPN
 Intranet-basedIntranet-based - If a company has one or more- If a company has one or more
remote locations that they wish to join in a singleremote locations that they wish to join in a single
private network, they can create an intranet VPNprivate network, they can create an intranet VPN
to connect LAN to LAN.to connect LAN to LAN.
 Extranet-basedExtranet-based - When a company has a close- When a company has a close
relationship with another company (for example, arelationship with another company (for example, a
partner, supplier or customer), they can build anpartner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and thatextranet VPN that connects LAN to LAN, and that
allows all of the various companies to work in aallows all of the various companies to work in a
shared environment.shared environment.
Brief Overview of How itBrief Overview of How it
WorksWorks
 Two connections – one is made to theTwo connections – one is made to the
Internet and the second is made to the VPN.Internet and the second is made to the VPN.
 Datagrams – contains data, destination andDatagrams – contains data, destination and
source information.source information.
 Firewalls – VPNs allow authorized users toFirewalls – VPNs allow authorized users to
pass through the firewalls.pass through the firewalls.
 Protocols – protocols create the VPNProtocols – protocols create the VPN
tunnels.tunnels.
VPN ProtocolsVPN Protocols
 There are three mainThere are three main
protocols that power theprotocols that power the
vast majority of VPN’s:vast majority of VPN’s:
– PPTPPPTP
– L2TPL2TP
– IPsecIPsec
 All three protocolsAll three protocols
emphasize encryption andemphasize encryption and
authentication; preservingauthentication; preserving
data integrity that may bedata integrity that may be
sensitive and allowingsensitive and allowing
clients/servers to establishclients/servers to establish
an identity on the networkan identity on the network
Four Critical FunctionsFour Critical Functions
 AuthenticationAuthentication – validates that the data was sent from the– validates that the data was sent from the
sender.sender.
 Access controlAccess control – limiting unauthorized users from– limiting unauthorized users from
accessing the network.accessing the network.
 ConfidentialityConfidentiality – preventing the data to be read or copied– preventing the data to be read or copied
as the data is being transported.as the data is being transported.
 Data IntegrityData Integrity – ensuring that the data– ensuring that the data
has not been alteredhas not been altered
 This functions achieved by Using VPN protocolsThis functions achieved by Using VPN protocols
 Internet Protocol Security Protocol (IPSec) providesInternet Protocol Security Protocol (IPSec) provides
enhanced security features such as better encryptionenhanced security features such as better encryption
algorithms and more comprehensive authentication.algorithms and more comprehensive authentication.
 IPSec has two encryption modes:IPSec has two encryption modes: tunneltunnel andand transporttransport..
Tunnel encrypts the header and the payload of eachTunnel encrypts the header and the payload of each
packet while transport only encrypts the payload.packet while transport only encrypts the payload.
 IPSec can encrypt data between various devices, such as:IPSec can encrypt data between various devices, such as:
– Router to routerRouter to router
– Firewall to routerFirewall to router
– PC to routerPC to router
– PC to serverPC to server
VPN Protocols (continued)VPN Protocols (continued)
VPN TunnelingVPN Tunneling
 VPN Tunneling supports two types: voluntary tunneling andVPN Tunneling supports two types: voluntary tunneling and
compulsory tunnelingcompulsory tunneling
 Voluntary tunneling is where the VPN client manages theVoluntary tunneling is where the VPN client manages the
connection setup.connection setup.
 Compulsory tunneling is where the carrier network providerCompulsory tunneling is where the carrier network provider
manages the VPN connection setup.manages the VPN connection setup.
TunnelingTunneling
– allows senders to encapsulate their data in IP packets thatallows senders to encapsulate their data in IP packets that
hide the routing and switching infrastructure of the Internethide the routing and switching infrastructure of the Internet
– to ensure data security against unwanted viewers, orto ensure data security against unwanted viewers, or
hackershackers
Tunneling requires three different protocolsTunneling requires three different protocols::
 Passenger protocolPassenger protocol - The original data (IPX, IP)- The original data (IPX, IP)
being carriedbeing carried
 Encapsulating protocolEncapsulating protocol - The protocol (GRE, IPSec,- The protocol (GRE, IPSec,
L2F, PPTP, L2TP) that is wrapped around theL2F, PPTP, L2TP) that is wrapped around the
original dataoriginal data
 Carrier protocolCarrier protocol - The protocol used by the network- The protocol used by the network
that the information is traveling overthat the information is traveling over
VPN Packet TransmissionVPN Packet Transmission
 Packets are first encrypted before sent out forPackets are first encrypted before sent out for
transmission over the Internet. The encryptedtransmission over the Internet. The encrypted
packet is placed inside an unencrypted packet. Thepacket is placed inside an unencrypted packet. The
unencrypted outer packet is read by the routingunencrypted outer packet is read by the routing
equipment so that it may be properly routed to itsequipment so that it may be properly routed to its
destinationdestination
 Once the packet reaches its destination, the outerOnce the packet reaches its destination, the outer
packet is stripped off and the inner packet ispacket is stripped off and the inner packet is
decrypteddecrypted
VPN Security: FirewallsVPN Security: Firewalls
A well-designed VPN uses several methods forA well-designed VPN uses several methods for
keeping your connection and data secure:keeping your connection and data secure:
 FirewallsFirewalls
 EncryptionEncryption
 IPSecIPSec
 AuthenticationAuthentication
 You can set firewalls to restrict the number of openYou can set firewalls to restrict the number of open
ports, what type of packets are passed through andports, what type of packets are passed through and
which protocols are allowed through.which protocols are allowed through.
VPN EncapsulationVPN Encapsulation
Advantages of VPN’sAdvantages of VPN’s
 Cost EffectiveCost Effective
 Greater scalabilityGreater scalability
 Easy to add/remove usersEasy to add/remove users
 MobilityMobility
 SecuritySecurity
Disadvantages of VPN’sDisadvantages of VPN’s
 Because the connection travels over publicBecause the connection travels over public
lines, a strong understanding of networklines, a strong understanding of network
security issues and proper precautionssecurity issues and proper precautions
before VPN deployment are necessarybefore VPN deployment are necessary
 VPN connection stability is mainly inVPN connection stability is mainly in
control of the Internet stability, factorscontrol of the Internet stability, factors
outside an organizations controloutside an organizations control
 Differing VPN technologies may not workDiffering VPN technologies may not work
together due to immature standardstogether due to immature standards
Virtual Private Networks (VPN)Virtual Private Networks (VPN)
Basic ArchitectureBasic Architecture
Resources UsedResources Used
 http://wiki.answer.orghttp://wiki.answer.org
 http://www.uwsp.edu/it/vpn/http://www.uwsp.edu/it/vpn/
 http://info.lib.uh.edu/services/vpn.htmlhttp://info.lib.uh.edu/services/vpn.html
 http://www.cites.uiuc.edu/vpn/http://www.cites.uiuc.edu/vpn/
 http://www.positivenetworks.net/images/clihttp://www.positivenetworks.net/images/cli
ent-uploads/jumppage2.htment-uploads/jumppage2.htm

More Related Content

What's hot

Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Osp Dev
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
Shubhayu Roy
 
Vpn security
Vpn security Vpn security
Vpn security
AnushiyaAron
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Vpn
VpnVpn
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
VPN
VPNVPN
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
sonalikasingh15
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
Devolutions
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
Riazehri
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 

What's hot (20)

Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn security
Vpn security Vpn security
Vpn security
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Vpn
VpnVpn
Vpn
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
VPN
VPNVPN
VPN
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 

Viewers also liked

SEO In Vancouver
SEO In VancouverSEO In Vancouver
SEO In Vancouver
TommySWhitehouse
 
Un año papá...Un día te veré...
Un año papá...Un día te veré...Un año papá...Un día te veré...
Un año papá...Un día te veré...Monica Bonino
 
Welding equipment | #Weldingequipment
Welding equipment | #WeldingequipmentWelding equipment | #Weldingequipment
Welding equipment | #Weldingequipment
East Coast Welding Supplies Pty Ltd
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled PresentationMonica Bonino
 
САМОАНАЛИЗ Л. Рон Хаббард
САМОАНАЛИЗ Л. Рон ХаббардСАМОАНАЛИЗ Л. Рон Хаббард
САМОАНАЛИЗ Л. Рон Хаббард
web-processing
 
Vancouver SEO Services
Vancouver SEO ServicesVancouver SEO Services
Vancouver SEO Services
TommySWhitehouse
 
Pequeñas y medianas empresas
Pequeñas y medianas empresasPequeñas y medianas empresas
Pequeñas y medianas empresas
_Manuelr04
 
ДИАНЕТИКА 55! Руководство по эффективному общению
ДИАНЕТИКА 55! Руководство по эффективному общениюДИАНЕТИКА 55! Руководство по эффективному общению
ДИАНЕТИКА 55! Руководство по эффективному общению
web-processing
 
Estructura discreta para video
Estructura discreta para videoEstructura discreta para video
Estructura discreta para video
U.F.T Fermin Toro
 
Настольная книга для Преклиров
Настольная книга для ПреклировНастольная книга для Преклиров
Настольная книга для Преклиров
web-processing
 
Cheap Vacation Trips For Summer
Cheap Vacation Trips For SummerCheap Vacation Trips For Summer
Cheap Vacation Trips For Summer
Scott Caile
 
The Concept Of Recycling In Phoenix
The Concept Of Recycling In PhoenixThe Concept Of Recycling In Phoenix
The Concept Of Recycling In Phoenix
Scott Caile
 
My Portfolio
My PortfolioMy Portfolio
My Portfolio
DIVIJ WADHAWAN
 
Punctuationpowerpoint 100302004113-phpapp02
Punctuationpowerpoint 100302004113-phpapp02Punctuationpowerpoint 100302004113-phpapp02
Punctuationpowerpoint 100302004113-phpapp02
Darshana Viduranga
 
영화 '부러진 화살'을 통해 본 진실과 정의
영화 '부러진 화살'을 통해 본 진실과 정의영화 '부러진 화살'을 통해 본 진실과 정의
영화 '부러진 화살'을 통해 본 진실과 정의
Seungjoon Lee
 

Viewers also liked (17)

SEO In Vancouver
SEO In VancouverSEO In Vancouver
SEO In Vancouver
 
Un año papá...Un día te veré...
Un año papá...Un día te veré...Un año papá...Un día te veré...
Un año papá...Un día te veré...
 
Welding equipment | #Weldingequipment
Welding equipment | #WeldingequipmentWelding equipment | #Weldingequipment
Welding equipment | #Weldingequipment
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
САМОАНАЛИЗ Л. Рон Хаббард
САМОАНАЛИЗ Л. Рон ХаббардСАМОАНАЛИЗ Л. Рон Хаббард
САМОАНАЛИЗ Л. Рон Хаббард
 
Vancouver SEO Services
Vancouver SEO ServicesVancouver SEO Services
Vancouver SEO Services
 
Pequeñas y medianas empresas
Pequeñas y medianas empresasPequeñas y medianas empresas
Pequeñas y medianas empresas
 
ДИАНЕТИКА 55! Руководство по эффективному общению
ДИАНЕТИКА 55! Руководство по эффективному общениюДИАНЕТИКА 55! Руководство по эффективному общению
ДИАНЕТИКА 55! Руководство по эффективному общению
 
Estructura discreta para video
Estructura discreta para videoEstructura discreta para video
Estructura discreta para video
 
Настольная книга для Преклиров
Настольная книга для ПреклировНастольная книга для Преклиров
Настольная книга для Преклиров
 
Cheap Vacation Trips For Summer
Cheap Vacation Trips For SummerCheap Vacation Trips For Summer
Cheap Vacation Trips For Summer
 
The Concept Of Recycling In Phoenix
The Concept Of Recycling In PhoenixThe Concept Of Recycling In Phoenix
The Concept Of Recycling In Phoenix
 
PHPDoc aka Doxygen standard
PHPDoc aka Doxygen standardPHPDoc aka Doxygen standard
PHPDoc aka Doxygen standard
 
Accoled dm 2014
Accoled dm 2014Accoled dm 2014
Accoled dm 2014
 
My Portfolio
My PortfolioMy Portfolio
My Portfolio
 
Punctuationpowerpoint 100302004113-phpapp02
Punctuationpowerpoint 100302004113-phpapp02Punctuationpowerpoint 100302004113-phpapp02
Punctuationpowerpoint 100302004113-phpapp02
 
영화 '부러진 화살'을 통해 본 진실과 정의
영화 '부러진 화살'을 통해 본 진실과 정의영화 '부러진 화살'을 통해 본 진실과 정의
영화 '부러진 화살'을 통해 본 진실과 정의
 

Similar to Virtual private networks by darshana viduranga

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Kuldeep Padhiyar
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
Pradeep wolf king
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
Ayano Midakso
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Vpn
VpnVpn
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Vpn 3
Vpn 3Vpn 3
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
adeelahmed0345
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
Nicole Gomez
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
SonuSingh81247
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 

Similar to Virtual private networks by darshana viduranga (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ism
IsmIsm
Ism
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vpn
VpnVpn
Vpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
The vpn
The vpnThe vpn
The vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

Virtual private networks by darshana viduranga

  • 1. By – K.Darshana Viduranga – 54 HNDIT -2nd year
  • 2. What is a VPN?What is a VPN?  Virtual Private Network is aVirtual Private Network is a type of private network thattype of private network that uses publicuses public telecommunication, such astelecommunication, such as the Internet, instead of leasedthe Internet, instead of leased lines to communicate.lines to communicate.  Became popular as moreBecame popular as more employees worked in remoteemployees worked in remote locations.locations.
  • 3. What is a VPN? (Cont.)What is a VPN? (Cont.)  A VPN can be created by connectingA VPN can be created by connecting offices and single users (including mobileoffices and single users (including mobile users) to the nearest service providers POPusers) to the nearest service providers POP (Point of Presence) and using that service(Point of Presence) and using that service provider’s backbone network, or even theprovider’s backbone network, or even the Internet, as the tunnel between officesInternet, as the tunnel between offices  A VPN includes authentication andA VPN includes authentication and encryption to protect data integrity andencryption to protect data integrity and confidentialityconfidentiality
  • 4. Who uses VPN’s?Who uses VPN’s?  VPN’s can be found in homes, workplaces, orVPN’s can be found in homes, workplaces, or anywhere else as long as an ISP (Internet Serviceanywhere else as long as an ISP (Internet Service Provider) is available.Provider) is available.  VPN’s allow company employees who travelVPN’s allow company employees who travel often or who are outside their companyoften or who are outside their company headquarters to safely and securely connect toheadquarters to safely and securely connect to their company’s Intranettheir company’s Intranet
  • 5. Types of VPNTypes of VPN  Remote-Access VPNRemote-Access VPN  Site-to-Site VPNSite-to-Site VPN
  • 6. Remote-Access VPNRemote-Access VPN  Remote-accessRemote-access, also called a, also called a virtual private dial-virtual private dial- up networkup network ((VPDNVPDN), is a user-to-LAN), is a user-to-LAN connection used by a company that has employeesconnection used by a company that has employees who need to connect to the private network fromwho need to connect to the private network from various remote locations.various remote locations.  A good example of a company that needs aA good example of a company that needs a remote-access VPN would be a large firm withremote-access VPN would be a large firm with hundreds of sales people in the field.hundreds of sales people in the field.  Remote-access VPNs permit secure, encryptedRemote-access VPNs permit secure, encrypted connections between a company's private networkconnections between a company's private network and remote users through a third-party serviceand remote users through a third-party service provider.provider.
  • 7. Site-to-Site VPNSite-to-Site VPN  Intranet-basedIntranet-based - If a company has one or more- If a company has one or more remote locations that they wish to join in a singleremote locations that they wish to join in a single private network, they can create an intranet VPNprivate network, they can create an intranet VPN to connect LAN to LAN.to connect LAN to LAN.  Extranet-basedExtranet-based - When a company has a close- When a company has a close relationship with another company (for example, arelationship with another company (for example, a partner, supplier or customer), they can build anpartner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and thatextranet VPN that connects LAN to LAN, and that allows all of the various companies to work in aallows all of the various companies to work in a shared environment.shared environment.
  • 8. Brief Overview of How itBrief Overview of How it WorksWorks  Two connections – one is made to theTwo connections – one is made to the Internet and the second is made to the VPN.Internet and the second is made to the VPN.  Datagrams – contains data, destination andDatagrams – contains data, destination and source information.source information.  Firewalls – VPNs allow authorized users toFirewalls – VPNs allow authorized users to pass through the firewalls.pass through the firewalls.  Protocols – protocols create the VPNProtocols – protocols create the VPN tunnels.tunnels.
  • 9. VPN ProtocolsVPN Protocols  There are three mainThere are three main protocols that power theprotocols that power the vast majority of VPN’s:vast majority of VPN’s: – PPTPPPTP – L2TPL2TP – IPsecIPsec  All three protocolsAll three protocols emphasize encryption andemphasize encryption and authentication; preservingauthentication; preserving data integrity that may bedata integrity that may be sensitive and allowingsensitive and allowing clients/servers to establishclients/servers to establish an identity on the networkan identity on the network
  • 10. Four Critical FunctionsFour Critical Functions  AuthenticationAuthentication – validates that the data was sent from the– validates that the data was sent from the sender.sender.  Access controlAccess control – limiting unauthorized users from– limiting unauthorized users from accessing the network.accessing the network.  ConfidentialityConfidentiality – preventing the data to be read or copied– preventing the data to be read or copied as the data is being transported.as the data is being transported.  Data IntegrityData Integrity – ensuring that the data– ensuring that the data has not been alteredhas not been altered  This functions achieved by Using VPN protocolsThis functions achieved by Using VPN protocols
  • 11.  Internet Protocol Security Protocol (IPSec) providesInternet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryptionenhanced security features such as better encryption algorithms and more comprehensive authentication.algorithms and more comprehensive authentication.  IPSec has two encryption modes:IPSec has two encryption modes: tunneltunnel andand transporttransport.. Tunnel encrypts the header and the payload of eachTunnel encrypts the header and the payload of each packet while transport only encrypts the payload.packet while transport only encrypts the payload.  IPSec can encrypt data between various devices, such as:IPSec can encrypt data between various devices, such as: – Router to routerRouter to router – Firewall to routerFirewall to router – PC to routerPC to router – PC to serverPC to server VPN Protocols (continued)VPN Protocols (continued)
  • 12. VPN TunnelingVPN Tunneling  VPN Tunneling supports two types: voluntary tunneling andVPN Tunneling supports two types: voluntary tunneling and compulsory tunnelingcompulsory tunneling  Voluntary tunneling is where the VPN client manages theVoluntary tunneling is where the VPN client manages the connection setup.connection setup.  Compulsory tunneling is where the carrier network providerCompulsory tunneling is where the carrier network provider manages the VPN connection setup.manages the VPN connection setup.
  • 13. TunnelingTunneling – allows senders to encapsulate their data in IP packets thatallows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internethide the routing and switching infrastructure of the Internet – to ensure data security against unwanted viewers, orto ensure data security against unwanted viewers, or hackershackers Tunneling requires three different protocolsTunneling requires three different protocols::  Passenger protocolPassenger protocol - The original data (IPX, IP)- The original data (IPX, IP) being carriedbeing carried  Encapsulating protocolEncapsulating protocol - The protocol (GRE, IPSec,- The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around theL2F, PPTP, L2TP) that is wrapped around the original dataoriginal data  Carrier protocolCarrier protocol - The protocol used by the network- The protocol used by the network that the information is traveling overthat the information is traveling over
  • 14. VPN Packet TransmissionVPN Packet Transmission  Packets are first encrypted before sent out forPackets are first encrypted before sent out for transmission over the Internet. The encryptedtransmission over the Internet. The encrypted packet is placed inside an unencrypted packet. Thepacket is placed inside an unencrypted packet. The unencrypted outer packet is read by the routingunencrypted outer packet is read by the routing equipment so that it may be properly routed to itsequipment so that it may be properly routed to its destinationdestination  Once the packet reaches its destination, the outerOnce the packet reaches its destination, the outer packet is stripped off and the inner packet ispacket is stripped off and the inner packet is decrypteddecrypted
  • 15. VPN Security: FirewallsVPN Security: Firewalls A well-designed VPN uses several methods forA well-designed VPN uses several methods for keeping your connection and data secure:keeping your connection and data secure:  FirewallsFirewalls  EncryptionEncryption  IPSecIPSec  AuthenticationAuthentication  You can set firewalls to restrict the number of openYou can set firewalls to restrict the number of open ports, what type of packets are passed through andports, what type of packets are passed through and which protocols are allowed through.which protocols are allowed through.
  • 17. Advantages of VPN’sAdvantages of VPN’s  Cost EffectiveCost Effective  Greater scalabilityGreater scalability  Easy to add/remove usersEasy to add/remove users  MobilityMobility  SecuritySecurity
  • 18. Disadvantages of VPN’sDisadvantages of VPN’s  Because the connection travels over publicBecause the connection travels over public lines, a strong understanding of networklines, a strong understanding of network security issues and proper precautionssecurity issues and proper precautions before VPN deployment are necessarybefore VPN deployment are necessary  VPN connection stability is mainly inVPN connection stability is mainly in control of the Internet stability, factorscontrol of the Internet stability, factors outside an organizations controloutside an organizations control  Differing VPN technologies may not workDiffering VPN technologies may not work together due to immature standardstogether due to immature standards
  • 19. Virtual Private Networks (VPN)Virtual Private Networks (VPN) Basic ArchitectureBasic Architecture
  • 20. Resources UsedResources Used  http://wiki.answer.orghttp://wiki.answer.org  http://www.uwsp.edu/it/vpn/http://www.uwsp.edu/it/vpn/  http://info.lib.uh.edu/services/vpn.htmlhttp://info.lib.uh.edu/services/vpn.html  http://www.cites.uiuc.edu/vpn/http://www.cites.uiuc.edu/vpn/  http://www.positivenetworks.net/images/clihttp://www.positivenetworks.net/images/cli ent-uploads/jumppage2.htment-uploads/jumppage2.htm