SlideShare a Scribd company logo
Virtual Private Network
(VPN)
A VPN, or Virtual Private Network, allows you to
create a secure connection to another network
over the Internet. VPNs can be used to access
region-restricted websites, shield your browsing
activity from prying eyes on public Wi-Fi, and
more
What’s VPN???
Why we use or need VPN???
It secures your computer’s
internet connection to
guarantee that all of the data
you’re sending and receiving
is encrypted and secured
from prying eyes.
The most important thing
you need to know about a
VPN:
Virtual Private Network (VPN)
The origin of VPN
 The word VPN originates from three words i.e.
 Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between
two or more devices is achieved. Therefore, the communication is virtually but not physically there.
 Private: Private means to keep something a secret from the general public. Although those two devices are
communicating with each other in a public environment, there is no third party who can interrupt this
communication or receive any data that is exchanged between them.
 Network: A network consists of two or more devices that can freely and electronically communicate with
each other via cables and wire. A VPN is a network. It can transmit information over long distances
effectively and efficiently.
 User Authentication : VPN must be able to verify user authentication and allow only authorized
users to access the network
Requirement VPN:
 Address Management : Assign addresses to clients and ensure that private addresses are kept private on the
VPN.
 Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP,
IPX etc
 Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data
 Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note
that keys are required for encryption
Types of VPN :
 Intranet VPN.
 Extranet VPN.
 Remote access VPN.
The Intranet VPN
Intranet VPNs link corporate
headquarters, remote offices, and branch
offices over a shared infrastructure using
dedicated connections. The VPN typically
is an alternative to a leased line. It
provides the benefit of extended
connectivity and lower cost.
The Extranet VPN
Extranet VPNs link customers,
suppliers, partners, or
communities of interest to a
corporate intranet over a shared
infrastructure using dedicated
connections. In this example,
the VPN is often an alternative to
fax, snail mail, or EDI. The
extranet VPN facilitates e-
commerce
Remote Access VPN
A remote-access VPN allows
individual users to establish secure
connections with a remote computer
network. Those users can access the
secure resources on that network as if
they were directly plugged in to the
network's servers. An example of a
company that needs a remote-access
VPN is a large firm with hundreds of
salespeople in the field. Another name
for this type of VPN is virtual private
dial-up network (VPDN),
acknowledging that in its earliest form,
a remote-access VPN required dialing
in to a server using an analog
telephone system.
Tunneling
 Tunnelling involves the encapsulation,
transmission and de-capsulation of data packets.
 The data is encapsulated with additional headers.
 The additional headers provide routing
information for encapsulated data to be routed
between the end points of a tunnel.
 Requires 3 protocols
1) Carrier, Default network protocol
2) Passenger ,Original data
3) Encapsulation GRE, IPsec , PPTP etc.
Tunnel Types
 Voluntary
 VPN request is initiated by the client.
 The client remains the end point.
 Compulsory
 VPN access server creates a compulsory tunnel for the client.
 In this case, the dial-up access server between the user’s computer and the tunnel
server is the tunnel end point that acts as a client .
 Voluntary tunneling is used in most applications.
Advantages :
 Greater scalability
 Easy to add/remove users
 Reduced long-distance
telecommunications costs
 Mobility
 Security
 Disadvantages :
 Lack of standards
 Understanding of security issues
 Unpredictable Internet traffic
 Difficult to accommodate
products from different vendors
Advantages and Disadvantages of VPN :
Thanks for your ATTENTION!
Any Question???

More Related Content

What's hot

VPN
VPNVPN
VPN presentation
VPN presentationVPN presentation
VPN presentation
Riazehri
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VPN Network
VPN NetworkVPN Network
VPN Network
Wani Zahoor
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Mariana Hansen
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
HASHIR RAZA
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
Devolutions
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
Rama Krishna Nakka
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Sovello Hildebrand
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 

What's hot (20)

VPN
VPNVPN
VPN
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 

Similar to Vpn-Virtual Private Network

Vpn
VpnVpn
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
adeelahmed0345
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
Nicole Gomez
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
Shreyank Gupta
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
NarcisIlie1
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
Darshana Viduranga
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
virtual private network vpn pros and cons
virtual private network vpn pros and consvirtual private network vpn pros and cons
virtual private network vpn pros and cons
tgmrcr
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 

Similar to Vpn-Virtual Private Network (20)

Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
The vpn
The vpnThe vpn
The vpn
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
VPN
VPN VPN
VPN
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
virtual private network vpn pros and cons
virtual private network vpn pros and consvirtual private network vpn pros and cons
virtual private network vpn pros and cons
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Vpn-Virtual Private Network

  • 2. A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more What’s VPN???
  • 3. Why we use or need VPN??? It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. The most important thing you need to know about a VPN:
  • 5. The origin of VPN  The word VPN originates from three words i.e.  Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved. Therefore, the communication is virtually but not physically there.  Private: Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.  Network: A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
  • 6.  User Authentication : VPN must be able to verify user authentication and allow only authorized users to access the network Requirement VPN:  Address Management : Assign addresses to clients and ensure that private addresses are kept private on the VPN.  Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP, IPX etc  Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data  Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note that keys are required for encryption
  • 7. Types of VPN :  Intranet VPN.  Extranet VPN.  Remote access VPN.
  • 8. The Intranet VPN Intranet VPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. The VPN typically is an alternative to a leased line. It provides the benefit of extended connectivity and lower cost.
  • 9. The Extranet VPN Extranet VPNs link customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure using dedicated connections. In this example, the VPN is often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e- commerce
  • 10. Remote Access VPN A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers. An example of a company that needs a remote-access VPN is a large firm with hundreds of salespeople in the field. Another name for this type of VPN is virtual private dial-up network (VPDN), acknowledging that in its earliest form, a remote-access VPN required dialing in to a server using an analog telephone system.
  • 11. Tunneling  Tunnelling involves the encapsulation, transmission and de-capsulation of data packets.  The data is encapsulated with additional headers.  The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel.  Requires 3 protocols 1) Carrier, Default network protocol 2) Passenger ,Original data 3) Encapsulation GRE, IPsec , PPTP etc.
  • 12. Tunnel Types  Voluntary  VPN request is initiated by the client.  The client remains the end point.  Compulsory  VPN access server creates a compulsory tunnel for the client.  In this case, the dial-up access server between the user’s computer and the tunnel server is the tunnel end point that acts as a client .  Voluntary tunneling is used in most applications.
  • 13. Advantages :  Greater scalability  Easy to add/remove users  Reduced long-distance telecommunications costs  Mobility  Security  Disadvantages :  Lack of standards  Understanding of security issues  Unpredictable Internet traffic  Difficult to accommodate products from different vendors Advantages and Disadvantages of VPN :
  • 14. Thanks for your ATTENTION! Any Question???