Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Virtual private networks (vpn)
1. presentation on
VIRTUAL PRIVATE NETWORKS (VPN)
Name = Aviansh nath
B.tech – 2 year ( I T )
Roll no. 1429013009
Submitted to:
MS ARCHANA SHARMA
(ASTT.PROF;CSE/IT)
5. 1. Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet,
instead of leased lines to communicate.
2. Became popular as more employees worked in remote
locations.
3. Terminologies to understand how VPNs work.
What is VPN?
6. Who uses VPN ?
VPN’s can be found in homes, workplaces, or anywhere
else as long as an ISP (Internet Service Provider) is
available.
VPN’s allow company employees who travel often or
who are outside their company headquarters to safely
and securely connect to their company’s Intranet
7. Private Networks
vs.
Virtual Private Networks
1. Employees can access the network (Intranet) from
remote locations.
2. Secured networks.
3. The Internet is used as the backbone for VPNs
4. Saves cost tremendously from reduction of equipment
and maintenance costs.
5. Scalability
9. 1. Two connections – one is made to the Internet and the
second is made to the VPN.
2. Datagrams – contains data, destination and source
information.
3. Firewalls – VPNs allow authorized users to pass through
the firewalls.
4. Protocols – protocols create the VPN tunnels.
Brief Overview of How it Works
10. 1. Authentication – validates that the data was sent
from the sender.
2. Access control – limiting unauthorized users from
accessing the network.
3. Confidentiality – preventing the data to be read or
copied as the data is being transported.
4. Data Integrity – ensuring that the data has not been
altered
Four Critical Functions
11. Encryption
Encryption -- is a method of “scrambling” data
before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
12. Tunneling
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Two types of end points:
Remote Access
Site-to-Site
13.
14. In information technology, a protocol is the special set of rules that end points in a
telecommunication connection use when they communicate. Protocols specify
interactions between the communicating entities.
Protocols exist at several levels in a telecommunication connection. For example, there
are protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level.
What is protocol ?
The TCP/IP Internet protocols, a common example, consist of:
• Transmission Control Protocol (TCP), which uses a set of rules to
exchange messages with other Internet points at the information packet
level
• Internet Protocol (IP), which uses a set of rules to send and receive
messages at the Internet address level
• Additional protocols that include the Hypertext Transfer Protocol (HTTP)
and File Transfer Protocol (FTP), each with defined sets of rules to use with
corresponding programs elsewhere on the Internet
15. Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones above
17. Types of Implementations
What does “implementation” mean in VPNs?
3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
19. Device Types: Hardware
• Usually a VPN type of router
Pros
• Highest network
throughput
• Plug and Play
• Dual-purpose
Cons
• Cost
• Lack of flexibility
20. Device Types: Firewall
• More security.
Pros
• “Harden” Operating System
• Tri-purpose
• Cost-effective
Cons
• Still relatively costly
21. Device Types: Software
• Ideal for 2 end points not in same org.
• Great when different firewalls implemented
Pros
• Flexible
• Low relative cost
Cons
• Lack of efficiency
• More labor training
required
• Lower productivity;
higher labor costs
22.
23. Applications: Site-to-Site VPNs
Large-scale encryption between multiple fixed sites
such as remote offices and central offices
Network traffic is sent over the branch office Internet
connection
This saves the company hardware and management
expenses
24.
25. Applications: Remote Access
• Encrypted connections between mobile or remote users
and their corporate networks
• Remote user can make a local call to an ISP, as opposed
to a long distance call to the corporate remote access
server.
• Ideal for a telecommuter or mobile sales people.
• VPN allows mobile workers & telecommuters to take
advantage of broadband connectivity.
i.e. DSL, Cable
26. Industries That Use a VPN
Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care provider
Manufacturing: allow suppliers to view inventory & allow clients to
purchase online safely
Retail: able to securely transfer sales data or customer info
between stores & the headquarters
Banking/Financial: enables account information to be transferred
safely within departments & branches
General Business: communication between remote employees can
be securely exchanged