SlideShare a Scribd company logo
Virtual Private Network(VPN)
Contents:
▪ Introduction:VPN
▪ Traditional Connectivity
▪ Remote Access Virtual Private Network
▪ Brief Overview of How it Works
▪ Four Critical Functions
▪ Tunneling
▪ Four Protocols used in VPN
Contents:
▪ VPNTopology :Type ofVPNs
▪ Remote AccessVPN
▪ Site to siteVPN
▪ VPN Security
▪ VPN : Advantages
▪ VPN : Disadvantages
▪ Applications
▪ Future OfVPN
▪ References
Introduction: VPN
▪ Linking of two or more computing devices to share
resources is networking.
▪ Virtual Private Network is a type of private network that
uses public telecommunication, such as the Internet, instead
of leased lines to communicate .
Traditional Connectivity
Remote Access Virtual Private Network
Brief Overview of How it Works
▪ Two connections – one is made to the Internet and the
second is made to the VPN.
▪ Datagrams – contains data, destination and source
information.
▪ Firewalls – VPNs allow authorized users to pass through the
firewalls.
▪ Protocols – protocols create the VPN tunnels.
Four Critical Functions
▪ Authentication – validates that the data was sent from the
sender.
▪ Access control – limiting unauthorized users from
accessing the network.
▪ Confidentiality – preventing the data to be read or copied
as the data is being transported.
▪ Data Integrity – ensuring that the data has not been altered
Tunneling
▪ A virtual point-to-point connection made through a
public network. It transports encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram DataArea
Original Datagram
Data Encapsulation
Two types of end points:
 Remote Access
 Site-to-Site
Tunneling
▪ MostVPNs rely on tunneling to create a private network
that reaches across the Internet. Essentially, tunneling is
the process of placing an entire packet within another
packet and sending it over a network.
Tunneling requires three different protocols:
▪ Passenger protocol -The original data (IPX, IP) being
carried
▪ Encapsulating protocol -The protocol (GRE, IPSec, L2F,
PPTP, L2TP) that is wrapped around the original data
▪ Carrier protocol -The protocol used by the network that
the information is traveling over
Four Protocols used in VPN
▪ PPTP -- Point-to-Point Tunneling Protocol
▪ L2TP -- Layer 2 Tunneling Protocol
▪ IPsec -- Internet Protocol Security
▪ SOCKS – is not used as much as the ones above
VPN Topology : Type of VPNs
▪ Remote Access VPN
▪ Site-to-Site VPN
▪ Intranet VPN
▪ Extranet VPN
Remote AccessVPN
▪ Remote-access, called as virtual private dial-up network
(VPDN)
▪ LAN connection used by a company that has employees
who need to connect to the private network from various
remote locations.
▪ Remote-access VPNs permit secure encrypted
▪ connections between a company's private network.
Site-to-Site VPN
▪ Intranet-based - If a company has one or more remote locations
that they wish to join in a single private network, they can
create an intranet VPN to connect LAN to LAN.
▪ Extranet-based - When a company has a close relationship with
another company (for example, a partner, supplier or
customer), they can build an extranet VPN that connects LAN
to LAN, and that allows all of the various companies to work
in a shared environment.
VPN Security
▪ A well-designed VPN uses several methods for keeping your
connection and data secure:
▪ Firewalls
▪ Encryption
▪ IPSec
▪ You can set firewalls to restrict the number of open ports, what type of
packets are passed through and which protocols are allowed through.
VPN : Advantages
▪ Cost Savings .
▪ Extend geographic connectivity.
▪ Improve security
▪ Provide broadband networking compatibility
▪ Improve productivity
▪ Reliable
VPN : Disadvantages
▪ VPNs require an in-depth understanding of public network security
▪ VPN require more tools.
Applications
▪ Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care
provider
▪ Manufacturing: allow suppliers to view inventory & allow
clients to purchase online safely
▪ Retail: able to securely transfer sales data or customer info
between stores & the headquarters
▪ Banking/Financial: enables account information to be
transferred safely within departments & branches
▪ General Business: communication between remote
employees can be securely exchanged
Future OfVPN
▪ VPNs are continually being enhanced.
Example: Equant NV
▪ As the VPN market becomes larger, more applications
will be created along with more VPN providers and
new VPN types.
▪ Networks are expected to converge to create an
integrated VPN
▪ Improved protocols are expected, which will also
improve VPNs.
Future ofVPN: Companies withVPN
References:
▪ http://vpn.shmoo.com/
▪ http://www.uwsp.edu/it/vpn/
▪ http://info.lib.uh.edu/services/vpn.html
▪ http://www.cites.uiuc.edu/vpn/
▪ http://www.positivenetworks.net/images/client-
uploads/jumppage2.htm
All reference links have been checked so far and have been found running on 10-08-2013
References
▪ <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>
▪ Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007
<http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.
▪ Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works.
6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>.
▪ "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar.
2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.
All reference links have been checked so far and have been found running on 10-08-2013

More Related Content

What's hot

Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Global Online Trainings
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
KISHOYIANKISH
 
MPLS VPN
MPLS VPNMPLS VPN
VXLAN
VXLANVXLAN
VXLAN
SAliyev1
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
Vignesh kumar
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
GomzAriez
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
Muhd Mu'izuddin
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
Mostafa El Lathy
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
NCS Computech Ltd.
 
VPN
VPNVPN
VLAN
VLANVLAN
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
ArunKumar Subbiah
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
Swarup Kumar Mall
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
KwonSun Bae
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
IPv6
IPv6IPv6

What's hot (20)

Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
VXLAN
VXLANVXLAN
VXLAN
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
VPN
VPNVPN
VPN
 
VLAN
VLANVLAN
VLAN
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
IPv6
IPv6IPv6
IPv6
 

Similar to Vpn

Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
Rajesh Thakur
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
HASHIR RAZA
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
Shreyank Gupta
 
VPN
VPN VPN
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
virtual private network vpn pros and cons
virtual private network vpn pros and consvirtual private network vpn pros and cons
virtual private network vpn pros and cons
tgmrcr
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
ssusera1b6c7
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
Naim Latifi
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
Karthikeyan303142
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 

Similar to Vpn (20)

Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
VPN
VPN VPN
VPN
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
virtual private network vpn pros and cons
virtual private network vpn pros and consvirtual private network vpn pros and cons
virtual private network vpn pros and cons
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 

Recently uploaded

The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
kalichargn70th171
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
aisafed42
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 

Recently uploaded (20)

The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 

Vpn

  • 2. Contents: ▪ Introduction:VPN ▪ Traditional Connectivity ▪ Remote Access Virtual Private Network ▪ Brief Overview of How it Works ▪ Four Critical Functions ▪ Tunneling ▪ Four Protocols used in VPN
  • 3. Contents: ▪ VPNTopology :Type ofVPNs ▪ Remote AccessVPN ▪ Site to siteVPN ▪ VPN Security ▪ VPN : Advantages ▪ VPN : Disadvantages ▪ Applications ▪ Future OfVPN ▪ References
  • 4. Introduction: VPN ▪ Linking of two or more computing devices to share resources is networking. ▪ Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate .
  • 6. Remote Access Virtual Private Network
  • 7. Brief Overview of How it Works ▪ Two connections – one is made to the Internet and the second is made to the VPN. ▪ Datagrams – contains data, destination and source information. ▪ Firewalls – VPNs allow authorized users to pass through the firewalls. ▪ Protocols – protocols create the VPN tunnels.
  • 8. Four Critical Functions ▪ Authentication – validates that the data was sent from the sender. ▪ Access control – limiting unauthorized users from accessing the network. ▪ Confidentiality – preventing the data to be read or copied as the data is being transported. ▪ Data Integrity – ensuring that the data has not been altered
  • 9. Tunneling ▪ A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram DataArea Original Datagram Data Encapsulation Two types of end points:  Remote Access  Site-to-Site
  • 10. Tunneling ▪ MostVPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. Tunneling requires three different protocols: ▪ Passenger protocol -The original data (IPX, IP) being carried ▪ Encapsulating protocol -The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data ▪ Carrier protocol -The protocol used by the network that the information is traveling over
  • 11. Four Protocols used in VPN ▪ PPTP -- Point-to-Point Tunneling Protocol ▪ L2TP -- Layer 2 Tunneling Protocol ▪ IPsec -- Internet Protocol Security ▪ SOCKS – is not used as much as the ones above
  • 12. VPN Topology : Type of VPNs ▪ Remote Access VPN ▪ Site-to-Site VPN ▪ Intranet VPN ▪ Extranet VPN
  • 13. Remote AccessVPN ▪ Remote-access, called as virtual private dial-up network (VPDN) ▪ LAN connection used by a company that has employees who need to connect to the private network from various remote locations. ▪ Remote-access VPNs permit secure encrypted ▪ connections between a company's private network.
  • 14.
  • 15. Site-to-Site VPN ▪ Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. ▪ Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 16.
  • 17.
  • 18. VPN Security ▪ A well-designed VPN uses several methods for keeping your connection and data secure: ▪ Firewalls ▪ Encryption ▪ IPSec ▪ You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.
  • 19. VPN : Advantages ▪ Cost Savings . ▪ Extend geographic connectivity. ▪ Improve security ▪ Provide broadband networking compatibility ▪ Improve productivity ▪ Reliable
  • 20. VPN : Disadvantages ▪ VPNs require an in-depth understanding of public network security ▪ VPN require more tools.
  • 21. Applications ▪ Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider ▪ Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely ▪ Retail: able to securely transfer sales data or customer info between stores & the headquarters ▪ Banking/Financial: enables account information to be transferred safely within departments & branches ▪ General Business: communication between remote employees can be securely exchanged
  • 22. Future OfVPN ▪ VPNs are continually being enhanced. Example: Equant NV ▪ As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. ▪ Networks are expected to converge to create an integrated VPN ▪ Improved protocols are expected, which will also improve VPNs.
  • 24. References: ▪ http://vpn.shmoo.com/ ▪ http://www.uwsp.edu/it/vpn/ ▪ http://info.lib.uh.edu/services/vpn.html ▪ http://www.cites.uiuc.edu/vpn/ ▪ http://www.positivenetworks.net/images/client- uploads/jumppage2.htm All reference links have been checked so far and have been found running on 10-08-2013
  • 25. References ▪ <www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt> ▪ Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007 <http://compnetworking.about.com/od/vpn/l/aa010701a.htm>. ▪ Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works. 6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>. ▪ "Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar. 2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>. All reference links have been checked so far and have been found running on 10-08-2013