SlideShare a Scribd company logo
VPN:
Virtual Private Network
Presented by:
Ch Mohammad Usman
Roll No 15111
VPN Stands For :
• Virtual
• Private
• Network
What is VPN ?
• A Virtual Private Network (VPN) is a network
technology that creates a secure network
connection over a public network such as the
Internet or a private network owned by a service
provider. Large corporations, educational
institutions, and government agencies use VPN
technology to enable remote users to securely
connect to a private network.
Common VPN
Protocols
• Point-to-Point Tunneling Protocol (PPTP)
• Layer 2 Tunneling Protocol (L2TP)
• Internet Protocol Security (IPSec)
• Secure Sockets Layer (SSL)
Why you want a
VPN ?
• You can use it to connect securely to a remote
network via the Internet. Most companies
maintain VPNs so that employees can access
files, applications, printers, and other resources
on the office network without compromising
security.
• If you're concerned about your online privacy,
connecting to an encrypted VPN while you're on a
public or untrusted network—such as a Wi-Fi
hotspot in a hotel or coffee shop—is a smart, simple
security practice. Because the VPN encrypts your
Internet traffic, it helps to stop other people who
may be trying to snoop on your browsing via Wifi to
capture your passwords.
• one of the best reasons to use a VPN is to regional
restrictions, known as geo-blocking on certain websites.
Journalists and political dissidents use VPNs to get
around state-sponsored censorship all the time, but you
can also use a VPN for recreational purposes, such as
connecting to a British VPN to watch the YouTube
videos in Pakistan. Because your Internet traffic routes
through the VPN, it looks as if you're just British visitor.
Why to use VPN
( Short Story )
• Different types of threats continue to increase -
security
• It’s available and supported
• You can connect from anywhere and be ensured
you have a secure communication channel back to
Campus
• It’s supported across multiple platforms
• Extends the Campus network to remote users
How VPN Works
• GCUF Server is configured as a VPN Server
• The local GCUF VPN computer connects to its ISP
• The remote VPN wizard runs on the GCUF Server on the
remote network
• The remote GCUF Swl Server VPN computer connects to
its ISP
• When a computer on the local network communicates with
a computer on the remote network, data is encapsulated
and sent through the VPN tunnel
Types Of VPN
Three Types of implementation.
• Intranet – Within an organization
• Extranet – Outside an organization
• Remote Access – Employee to Business
Connection
Without VPN
• Loss of privacy
• Loss of data integrity
• Identity spoofing
• Difficult to secure
• Modified transactions
Secure with VPN
Protected secure communication channel
• Encrypted data
• Provides authentication
• Can connect from anywhere
• Encapsulated Data
How To Create A
VPN In Windows
10
1) Log on to your Windows 10 PC with an administrator
account.
2) Once on the desktop window, click the Start button
from the bottom-left corner of the screen.
3) From the left section of the displayed Start menu,
under the Places section, clickSettings.
4) On the open Settings window, click the Network &
Internet icon.
5) From the left pane of the open Network &
Internet window, click to select the VPN category.
6) From the right pane, click the + icon representing
the Add a VPN connection option.
7) On the Add a VPN connection box, populate the fields
with the correct values.
8) Make sure that the Remember my sign-in
info checkbox at the bottom is checked, and
click Save.
Note: You may not want to save the sign-in info
on public computers such as those in Internet
cafes, or libraries. Do NOT check the Remember
my sign-in info when using such computers.
9) Once the new VPN connection is successfully created,
back on the Network & Internet window, keeping
the VPN category selected from the left pane, click to
select the newly created VPN connection from the
right.
 Once selected, from the available buttons, you can
either click Connect or Forget to connect to the VPN
server using the provided details and credentials, or to
remove the created connection respectively. Optionally,
if needed, you can also click the Properties button to
make changes to the created VPN connection.
Future of VPN:
Companies with
VPN
References
• www.youtube.com
• www.slideshare.net
• www.csun.edu
• en.wikipedia.org
• www.webopedia.com
Thank You

More Related Content

What's hot

Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
Devolutions
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Osp Dev
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
VPN
VPNVPN
Vpn
VpnVpn
Virtual private network
Virtual private network Virtual private network
Virtual private network
Parth Akbari
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
Shubhayu Roy
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 

What's hot (20)

Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Vpn
VpnVpn
Vpn
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 

Viewers also liked

VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)tsholson
 
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
SCCE
 
CV_A Beukman_English
CV_A Beukman_EnglishCV_A Beukman_English
CV_A Beukman_EnglishAnita Beukman
 
Resumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidadResumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidad
Maximiliam Durán Millavil
 
Cómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familiasCómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familias
SCCE
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private network
Habibullah Adel
 
Лекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языкаЛекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языка
fiadotau
 
Visión de la unica y propuestas de crea
Visión de la unica y propuestas de creaVisión de la unica y propuestas de crea
Visión de la unica y propuestas de crea
Universidad San Luis Gonzaga de Ica
 
Tomorrowland
Tomorrowland Tomorrowland
Tomorrowland
ItzelBonillaa
 
Propuesta de estatuto de CREA.
Propuesta de estatuto de CREA.Propuesta de estatuto de CREA.
Propuesta de estatuto de CREA.
Universidad San Luis Gonzaga de Ica
 

Viewers also liked (13)

VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)Hanna s rubbish investigation (2)
Hanna s rubbish investigation (2)
 
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
¡Despertad! 2/2016 Spanish Watchtower Bible ang Tract of New York
 
Certifications
CertificationsCertifications
Certifications
 
CV_A Beukman_English
CV_A Beukman_EnglishCV_A Beukman_English
CV_A Beukman_English
 
Resumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidadResumen convención de los derechos de personas con discapacidad
Resumen convención de los derechos de personas con discapacidad
 
Cómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familiasCómo hablar sin herir || Ayuda para las familias
Cómo hablar sin herir || Ayuda para las familias
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private network
 
Лекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языкаЛекция 2. Лексические особенности научного и технического стиля японского языка
Лекция 2. Лексические особенности научного и технического стиля японского языка
 
Visión de la unica y propuestas de crea
Visión de la unica y propuestas de creaVisión de la unica y propuestas de crea
Visión de la unica y propuestas de crea
 
Tomorrowland
Tomorrowland Tomorrowland
Tomorrowland
 
Propuesta de estatuto de CREA.
Propuesta de estatuto de CREA.Propuesta de estatuto de CREA.
Propuesta de estatuto de CREA.
 

Similar to Vpn " Virtual Private Network "

VPN In Details
VPN In DetailsVPN In Details
VPN In Details
Humza Sajid
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
AceAtigaVallo
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Mariana Hansen
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
adeelahmed0345
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
Moin Islam
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Ayano Midakso
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
Cadariu Cristian
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
ssusera1b6c7
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
Vograce
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
Farah M. Altufaili
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
DrewPfister
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
Bluechip Gulf IT Services
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
Subrata Kumer Paul
 

Similar to Vpn " Virtual Private Network " (20)

VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

Vpn " Virtual Private Network "

  • 1. VPN: Virtual Private Network Presented by: Ch Mohammad Usman Roll No 15111
  • 2. VPN Stands For : • Virtual • Private • Network
  • 3. What is VPN ? • A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.
  • 4. Common VPN Protocols • Point-to-Point Tunneling Protocol (PPTP) • Layer 2 Tunneling Protocol (L2TP) • Internet Protocol Security (IPSec) • Secure Sockets Layer (SSL)
  • 5. Why you want a VPN ? • You can use it to connect securely to a remote network via the Internet. Most companies maintain VPNs so that employees can access files, applications, printers, and other resources on the office network without compromising security.
  • 6. • If you're concerned about your online privacy, connecting to an encrypted VPN while you're on a public or untrusted network—such as a Wi-Fi hotspot in a hotel or coffee shop—is a smart, simple security practice. Because the VPN encrypts your Internet traffic, it helps to stop other people who may be trying to snoop on your browsing via Wifi to capture your passwords.
  • 7. • one of the best reasons to use a VPN is to regional restrictions, known as geo-blocking on certain websites. Journalists and political dissidents use VPNs to get around state-sponsored censorship all the time, but you can also use a VPN for recreational purposes, such as connecting to a British VPN to watch the YouTube videos in Pakistan. Because your Internet traffic routes through the VPN, it looks as if you're just British visitor.
  • 8. Why to use VPN ( Short Story ) • Different types of threats continue to increase - security • It’s available and supported • You can connect from anywhere and be ensured you have a secure communication channel back to Campus • It’s supported across multiple platforms • Extends the Campus network to remote users
  • 9. How VPN Works • GCUF Server is configured as a VPN Server • The local GCUF VPN computer connects to its ISP • The remote VPN wizard runs on the GCUF Server on the remote network • The remote GCUF Swl Server VPN computer connects to its ISP • When a computer on the local network communicates with a computer on the remote network, data is encapsulated and sent through the VPN tunnel
  • 10. Types Of VPN Three Types of implementation. • Intranet – Within an organization • Extranet – Outside an organization • Remote Access – Employee to Business
  • 11. Connection Without VPN • Loss of privacy • Loss of data integrity • Identity spoofing • Difficult to secure • Modified transactions
  • 12. Secure with VPN Protected secure communication channel • Encrypted data • Provides authentication • Can connect from anywhere • Encapsulated Data
  • 13. How To Create A VPN In Windows 10 1) Log on to your Windows 10 PC with an administrator account. 2) Once on the desktop window, click the Start button from the bottom-left corner of the screen. 3) From the left section of the displayed Start menu, under the Places section, clickSettings.
  • 14.
  • 15. 4) On the open Settings window, click the Network & Internet icon.
  • 16. 5) From the left pane of the open Network & Internet window, click to select the VPN category. 6) From the right pane, click the + icon representing the Add a VPN connection option.
  • 17.
  • 18. 7) On the Add a VPN connection box, populate the fields with the correct values. 8) Make sure that the Remember my sign-in info checkbox at the bottom is checked, and click Save.
  • 19.
  • 20. Note: You may not want to save the sign-in info on public computers such as those in Internet cafes, or libraries. Do NOT check the Remember my sign-in info when using such computers.
  • 21. 9) Once the new VPN connection is successfully created, back on the Network & Internet window, keeping the VPN category selected from the left pane, click to select the newly created VPN connection from the right.
  • 22.  Once selected, from the available buttons, you can either click Connect or Forget to connect to the VPN server using the provided details and credentials, or to remove the created connection respectively. Optionally, if needed, you can also click the Properties button to make changes to the created VPN connection.
  • 23.
  • 25. References • www.youtube.com • www.slideshare.net • www.csun.edu • en.wikipedia.org • www.webopedia.com