SlideShare a Scribd company logo
VIRTUAL
PRIVATE
NETWORK




PREPARED BY:
Jigar B Navadiya
(D11CE144)
VIRTUAL PRIVATE NETWORK
 Definition
           and introductory notes
     VPN is the network which uses open
 distributed infrastructure of the internet
 to transmit data between corporate sites.
NEED FOR DEVELOPING VPN
 Remote  employees interested to access
  database of corporations.
 Corporate sites developing new relations.
 Increasing growth of the corporation.
VPN RESOLVES THE
PROBLEM
 Itprovides flexibility and scalability
 Cost advantage.
 Makes free from maintenance and training.
WORKING OF VPN
 STEP1…

 STEP2…

 STEP3…
 STEP4…
WORKING-STEP1 (cont…)
 The remote user dials into their local ISP and logs
 into the ISP’s network as usual.




                                            BACK
WORKING-STEP2 (cont…)
 When  connectivity to the
 corporate network is
 desired, the user
 initiates a tunnel request
 to the destination
 Security server




                      BACK
WORKING-STEP3 (cont…)
   The user then sends
    data    through    the
    tunnel which encrypted
    by the VPN software
    before being sent over
    the ISP connection




                     BACK
WORKING-STEP4 (cont…)
 Thedestination Security server receives
 the encrypted data and decrypts.
TYPES OF VPN
 VLL-Virtual   leased lines.
 VPRN-virtual   private routed network.
 VPDN-virtual   private dial-up network.
 VPLS-virtual   private LAN segments.
 Intranet   VPN.
 Extranet   VPN.
 Remote   access VPN.
Virtual Private Network


 VIRTUAL LEASED LINES
 Point to point link
  between two CPE
 IP tunnel between
  2 ISP edge
  routers.
 Frames are relayed
  between IP tunnels.
Virtual Private Network

   VIRTUAL PRIVATE ROUTED
   NETWORK
 Emulation of multisite
  WAN using internet.
 Packet forwarding at
  network layer.
 VPRN specific
  forwarding table at
  ISP routers that
  forwards the traffic.
VIRTUAL PRIVATE DIAL-UP
NETWORK
 On demand tunnel between remote user and
  corporate sites.
 There are possible 2 tunnels.

1… compulsory tunnel.
2… voluntary tunnel.
Virtual Private Network


COMPULSORY TUNNEL
   In this scenario L2TP
    Access Contractor (LAC)
    acting as a dial or
    network access server
    extends a PPP session
    across a backbone using
    L2TP to a remote L2TP
    Network Server (LNS).
    The       operation     of
    initiating the PPP session
    to the LAC is transparent
    to the user.
                 BACK
Virtual Private Network


VOLUNTARY TUNNEL
                Voluntary tunnel refers
                to the case where an
                individual host connects
                to a remote site using a
                tunnel originating on the
                host, with no involvement
                from intermediate
                network nodes. Tunnel
                mechanism chosen can be
                IPSec or L2TP.
VIRTUAL PRIVATE LAN
SEGMENTS
                 A Virtual Private
                  LAN Segment
                  (VPLS) is the
                  emulation of a LAN
                  segment using
                  internet facilities.
INTRANET VPN
                The branch office
                scenario securely
                connects two trusted
                intranets within the
                organization.
                Routers or firewalls
                acting as gateways for
                the office with vpn
                capabilities can be
                used to protect the
                corporate traffic.
EXTRANET VPN
 Inthis scenario multiple supplier intranets that need
 to access a common corporate network over the
 Internet. Each supplier is allowed access to only a
 limited set of destinations within the corporate
 network.
REMOTE ACCESS VPN
A remote user wants to be able to communicate securely
 and cost-effectively to his corporate intranet. This can
 be done by use of an VPN IPSec enabled remote client
 and firewall (or gateway).
VPN PROTOCOLS
 1. PPTP (Point-to-point tunneling
  protocol)
 2.   IPsec (IP security).
 3.   L2TP (layer2 transmission protocol).
LAYER2 TRANSMISSION
PROTOCOL


 What is actually the layer two transmission
 protocol ???



 NEXT
POINT TO POINT
TUNNELING PROTOCOL
 Introduction   to PPTP.
 How   actually PPTP works ???
 Security   provided by PPTP.
 Advantages   of PPTP.
 Disadvantages   of PPTP.



 BACK
INTERNET PROTOCOL
SECURITY
 Introduction   to IP security.
 Features   of IP security.
 Types   of IPsec protocols.
 Types   of modes used in IPsec.



 BACK
SECURITY OF VPN

 Hardware   solution
 Remote   access control.
CERTAIN H/W AND S/W
SPECIFICATIONS…
  Desktop software client for each remote
     user
 Dedicated hardware such as a VPN
  Concentrator or Secure
 PIX Firewall
 Dedicated VPN server for dial-up services
 NAS (Network Access Server) used by
  service provider for
 remote user VPN access
Virtual Private Network


VPN CONCENTRATOR
 Itincorporates the
 most advanced
 encryption and
 authentication
 techniques for
 Remote access
 VPN.
Virtual Private Network


VPN-OPTIMIZED ROUTER
 VPN-optimized
 routers provide
 scalability, routing,
 security and quality
 of service.
Virtual Private Network


PIX FIREWALL
 Firewallcombines
 dynamic network
 address
 translation, proxy
 server, packet
 filtration, firewall
 and VPN
 capabilities in a
 single piece of
 hardware.
Virtual Private Network


VPN/VOIP Application
ADVANTAGES OF VPN


 Cost saving.
 Reduces the long distance charges of
  electronic transactions.
 Concrete security.
DISADVANTAGES OF VPN
VPNs require an in-depth understanding of public network security
 issues and taking proper precautions in VPN deployment.


 The availability and performance of an organization's wide-area
 VPN (over the Internet in particular) depends on factors largely
 outside of their control.


 VPN technologies from different vendors may not work well
 together due to immature standards.
CONCLUSION

 From this we can conclude that VPN
 provides a very safe , secure and cost-
 effective communication infrastructure.
Virtual Private Network




THANKING YOU !!!

More Related Content

What's hot

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
sonalikasingh15
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
Parth Akbari
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Osp Dev
 
VPN
VPNVPN
Vpn
VpnVpn
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
Shubhayu Roy
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
Muhammad Usman
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
NetProtocol Xpert
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
Devolutions
 
Vpn
VpnVpn
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
HASHIR RAZA
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 

What's hot (20)

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Vpn
VpnVpn
Vpn
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Vpn
VpnVpn
Vpn
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

Viewers also liked

Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Joseph Brunner
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
VISHNU N
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
VISHNU N
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
Dasarathi Dash
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (8)

Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Vpn_NJ ppt

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
Swarup Kumar Mall
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private NetworksDivam Goyal
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Ayano Midakso
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
Nicole Gomez
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Vpn
Vpn Vpn
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
Darshana Viduranga
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 

Similar to Vpn_NJ ppt (20)

V P N
V P NV P N
V P N
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
4 vpn s
4 vpn s4 vpn s
4 vpn s
 
Vpn
Vpn Vpn
Vpn
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 

Recently uploaded

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

Vpn_NJ ppt

  • 2. VIRTUAL PRIVATE NETWORK  Definition and introductory notes VPN is the network which uses open distributed infrastructure of the internet to transmit data between corporate sites.
  • 3. NEED FOR DEVELOPING VPN  Remote employees interested to access database of corporations.  Corporate sites developing new relations.  Increasing growth of the corporation.
  • 4. VPN RESOLVES THE PROBLEM  Itprovides flexibility and scalability  Cost advantage.  Makes free from maintenance and training.
  • 5. WORKING OF VPN  STEP1…  STEP2…  STEP3…  STEP4…
  • 6. WORKING-STEP1 (cont…)  The remote user dials into their local ISP and logs into the ISP’s network as usual. BACK
  • 7. WORKING-STEP2 (cont…)  When connectivity to the corporate network is desired, the user initiates a tunnel request to the destination Security server BACK
  • 8. WORKING-STEP3 (cont…)  The user then sends data through the tunnel which encrypted by the VPN software before being sent over the ISP connection BACK
  • 9. WORKING-STEP4 (cont…)  Thedestination Security server receives the encrypted data and decrypts.
  • 10. TYPES OF VPN  VLL-Virtual leased lines.  VPRN-virtual private routed network.  VPDN-virtual private dial-up network.  VPLS-virtual private LAN segments.  Intranet VPN.  Extranet VPN.  Remote access VPN.
  • 11. Virtual Private Network VIRTUAL LEASED LINES  Point to point link between two CPE  IP tunnel between 2 ISP edge routers.  Frames are relayed between IP tunnels.
  • 12. Virtual Private Network VIRTUAL PRIVATE ROUTED NETWORK  Emulation of multisite WAN using internet.  Packet forwarding at network layer.  VPRN specific forwarding table at ISP routers that forwards the traffic.
  • 13. VIRTUAL PRIVATE DIAL-UP NETWORK  On demand tunnel between remote user and corporate sites.  There are possible 2 tunnels. 1… compulsory tunnel. 2… voluntary tunnel.
  • 14. Virtual Private Network COMPULSORY TUNNEL  In this scenario L2TP Access Contractor (LAC) acting as a dial or network access server extends a PPP session across a backbone using L2TP to a remote L2TP Network Server (LNS). The operation of initiating the PPP session to the LAC is transparent to the user. BACK
  • 15. Virtual Private Network VOLUNTARY TUNNEL  Voluntary tunnel refers to the case where an individual host connects to a remote site using a tunnel originating on the host, with no involvement from intermediate network nodes. Tunnel mechanism chosen can be IPSec or L2TP.
  • 16. VIRTUAL PRIVATE LAN SEGMENTS A Virtual Private LAN Segment (VPLS) is the emulation of a LAN segment using internet facilities.
  • 17. INTRANET VPN  The branch office scenario securely connects two trusted intranets within the organization.  Routers or firewalls acting as gateways for the office with vpn capabilities can be used to protect the corporate traffic.
  • 18. EXTRANET VPN  Inthis scenario multiple supplier intranets that need to access a common corporate network over the Internet. Each supplier is allowed access to only a limited set of destinations within the corporate network.
  • 19. REMOTE ACCESS VPN A remote user wants to be able to communicate securely and cost-effectively to his corporate intranet. This can be done by use of an VPN IPSec enabled remote client and firewall (or gateway).
  • 20. VPN PROTOCOLS  1. PPTP (Point-to-point tunneling protocol)  2. IPsec (IP security).  3. L2TP (layer2 transmission protocol).
  • 21. LAYER2 TRANSMISSION PROTOCOL  What is actually the layer two transmission protocol ??? NEXT
  • 22. POINT TO POINT TUNNELING PROTOCOL  Introduction to PPTP.  How actually PPTP works ???  Security provided by PPTP.  Advantages of PPTP.  Disadvantages of PPTP. BACK
  • 23. INTERNET PROTOCOL SECURITY  Introduction to IP security.  Features of IP security.  Types of IPsec protocols.  Types of modes used in IPsec. BACK
  • 24. SECURITY OF VPN  Hardware solution  Remote access control.
  • 25. CERTAIN H/W AND S/W SPECIFICATIONS…  Desktop software client for each remote user  Dedicated hardware such as a VPN Concentrator or Secure  PIX Firewall  Dedicated VPN server for dial-up services  NAS (Network Access Server) used by service provider for  remote user VPN access
  • 26. Virtual Private Network VPN CONCENTRATOR  Itincorporates the most advanced encryption and authentication techniques for Remote access VPN.
  • 27. Virtual Private Network VPN-OPTIMIZED ROUTER  VPN-optimized routers provide scalability, routing, security and quality of service.
  • 28. Virtual Private Network PIX FIREWALL  Firewallcombines dynamic network address translation, proxy server, packet filtration, firewall and VPN capabilities in a single piece of hardware.
  • 30. ADVANTAGES OF VPN  Cost saving.  Reduces the long distance charges of electronic transactions.  Concrete security.
  • 31. DISADVANTAGES OF VPN VPNs require an in-depth understanding of public network security issues and taking proper precautions in VPN deployment. The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. VPN technologies from different vendors may not work well together due to immature standards.
  • 32. CONCLUSION  From this we can conclude that VPN provides a very safe , secure and cost- effective communication infrastructure.