Vpn presentation

17,815 views

Published on

Published in: Technology
2 Comments
17 Likes
Statistics
Notes
No Downloads
Views
Total views
17,815
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
1,725
Comments
2
Likes
17
Embeds 0
No embeds

No notes for slide

Vpn presentation

  1. 1. BY : WAQAS ANWAR
  2. 2. <ul><li>TUNNELING </li></ul><ul><li>FOUR PROTOCOLS USED IN VPN </li></ul><ul><li>VPN ENCAPSULATION OF PACKETS </li></ul><ul><li>TYPES OF IMPLEMENTATIONS </li></ul><ul><li>VPN BASIC ARCHITECTURE </li></ul><ul><li>ADVANTAGES </li></ul><ul><li>DIS ADVANTAGES </li></ul><ul><li>APPLICATIONS OF VPN </li></ul><ul><li>INDUSTRIES THAT MAY USE A VPN </li></ul><ul><li>SOME BUSINESSES THAT MAY USE A VPN </li></ul><ul><li>FUTURE OF A VPN </li></ul>
  3. 3. Tunneling <ul><li>A virtual point-to-point connection </li></ul><ul><li>made through a public network. It transports </li></ul><ul><li>encapsulated datagrams. </li></ul>Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram 1-18
  4. 4. Four Protocols used in VPN <ul><li>PPTP -- Point-to-Point Tunneling Protocol </li></ul><ul><li>L2TP -- Layer 2 Tunneling Protocol </li></ul><ul><li>IPsec -- Internet Protocol Security </li></ul><ul><li>SOCKS – is not used as much as the ones above </li></ul>1-18
  5. 5. VPN Encapsulation of Packets 1-18
  6. 6. Types of Implementations <ul><li>Three Types of implementation. </li></ul><ul><ul><li>Intranet – Within an organization </li></ul></ul><ul><ul><li>Extranet – Outside an organization </li></ul></ul><ul><ul><li>Remote Access – Employee to Business </li></ul></ul>1-18
  7. 7. VPN Basic Architecture 1-18
  8. 8. Advantages <ul><li>Eliminating the need for expensive long-distance leased lines </li></ul><ul><li>Reducing the long-distance telephone charges for remote access. </li></ul><ul><li>Operational costs </li></ul><ul><li>Flexibility of growth </li></ul><ul><li>Efficiency with broadband technology </li></ul>1-18
  9. 9. Disadvantages <ul><li>VPNs require an in-depth understanding of public network security issues and proper deployment of precautions </li></ul><ul><li>Availability and performance depends on factors largely outside of their control </li></ul><ul><li>Immature standards </li></ul><ul><li>VPNs need to accommodate protocols other than IP and existing internal network technology </li></ul>1-18
  10. 10. Applications: Site-to-Site VPNs <ul><li>Large-scale encryption between multiple fixed sites such as remote offices and central offices </li></ul><ul><li>Network traffic is sent over the branch office Internet connection </li></ul><ul><li>This saves the company hardware and management expenses </li></ul>1-18
  11. 11. Site-to-Site VPNs 1-18
  12. 12. Applications: Remote Access <ul><li>Encrypted connections between mobile or remote users and their corporate networks </li></ul><ul><li>Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server. </li></ul><ul><li>Ideal for a telecommuter or mobile sales people. </li></ul><ul><li>VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable </li></ul>1-18
  13. 13. Industries That May Use a VPN <ul><li>Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider </li></ul><ul><li>Manufacturing : allow suppliers to view inventory & allow clients to purchase online safely </li></ul><ul><li>Retail: able to securely transfer sales data or customer info between stores & the headquarters </li></ul><ul><li>Banking/Financial: enables account information to be transferred safely within departments & branches </li></ul><ul><li>General Business: communication between remote employees can be securely exchanged </li></ul>1-18
  14. 14. Some Businesses using a VPN <ul><li>CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN </li></ul><ul><li>ITW Foilmark secured remote location orders, running reports, & internet/intranet communications w/ a 168-bit encryption by switching to OpenReach VPN </li></ul><ul><li>Bacardi & Co. Implemented a 21-country- 44-location VPN </li></ul>1-18
  15. 15. FUTURE OF VPNs <ul><li>VPNs are continually being enhanced. </li></ul><ul><li>As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. </li></ul><ul><li>Networks are expected to converge to create an integrated VPN </li></ul><ul><li>Improved protocols are expected, which will also improve VPNs. </li></ul>1-18
  16. 16. <ul><li>In my conclusion virtual private network is an, </li></ul><ul><li>Eliminating the need for expensive long-distance leased lines </li></ul><ul><li>Reducing the long-distance telephone charges for remote access. </li></ul><ul><li>Transferring the support burden to the service providers </li></ul><ul><li>Operational costs </li></ul><ul><li>Flexibility of growth </li></ul><ul><li>Efficiency with broadband technology </li></ul>
  17. 17. 1:Feilner, Markus. &quot;Chapter 1 - VPN—Virtual Private Network&quot;. OpenVPN: Building and Integrating Virtual Private Networks: Learn How to Build Secure VPNs Using this Powerful Open Source Application. Packt Publishing. 2: Address Allocation for Private Internets, RFC 1918, Y. Rekhter et al. 3: RFC 2917, A Core MPLS IP VPN Architecture 4: Layer Two Tunneling Protocol &quot;L2TP&quot;, RFC 2661, W. Townsley et al. 5: IP Based Virtual Private Networks, RFC 2341, A. Valencia et al 6: Point-to-Point Tunneling Protocol (PPTP), RFC 2637, K. Hamzeh et al. 7: Http://en.wikipedia.org/wiki/vpn

×