Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Vpn presentation

32,263 views

Published on

Published in: Technology
  • DOWNLOAD THIS BOOKS INTO AVAILABLE FORMAT (Unlimited) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... Download Full EPUB Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... ACCESS WEBSITE for All Ebooks ......................................................................................................................... Download Full PDF EBOOK here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... Download EPUB Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... Download doc Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Nice presentation! Have you ever tried GOOSE VPN (https://goosevpn.com)?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Njce! Thanks for sharing.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • rahulsingh20010@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Vpn presentation

  1. 1. BY : WAQAS ANWAR
  2. 2. <ul><li>TUNNELING </li></ul><ul><li>FOUR PROTOCOLS USED IN VPN </li></ul><ul><li>VPN ENCAPSULATION OF PACKETS </li></ul><ul><li>TYPES OF IMPLEMENTATIONS </li></ul><ul><li>VPN BASIC ARCHITECTURE </li></ul><ul><li>ADVANTAGES </li></ul><ul><li>DIS ADVANTAGES </li></ul><ul><li>APPLICATIONS OF VPN </li></ul><ul><li>INDUSTRIES THAT MAY USE A VPN </li></ul><ul><li>SOME BUSINESSES THAT MAY USE A VPN </li></ul><ul><li>FUTURE OF A VPN </li></ul>
  3. 3. Tunneling <ul><li>A virtual point-to-point connection </li></ul><ul><li>made through a public network. It transports </li></ul><ul><li>encapsulated datagrams. </li></ul>Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram 1-18
  4. 4. Four Protocols used in VPN <ul><li>PPTP -- Point-to-Point Tunneling Protocol </li></ul><ul><li>L2TP -- Layer 2 Tunneling Protocol </li></ul><ul><li>IPsec -- Internet Protocol Security </li></ul><ul><li>SOCKS – is not used as much as the ones above </li></ul>1-18
  5. 5. VPN Encapsulation of Packets 1-18
  6. 6. Types of Implementations <ul><li>Three Types of implementation. </li></ul><ul><ul><li>Intranet – Within an organization </li></ul></ul><ul><ul><li>Extranet – Outside an organization </li></ul></ul><ul><ul><li>Remote Access – Employee to Business </li></ul></ul>1-18
  7. 7. VPN Basic Architecture 1-18
  8. 8. Advantages <ul><li>Eliminating the need for expensive long-distance leased lines </li></ul><ul><li>Reducing the long-distance telephone charges for remote access. </li></ul><ul><li>Operational costs </li></ul><ul><li>Flexibility of growth </li></ul><ul><li>Efficiency with broadband technology </li></ul>1-18
  9. 9. Disadvantages <ul><li>VPNs require an in-depth understanding of public network security issues and proper deployment of precautions </li></ul><ul><li>Availability and performance depends on factors largely outside of their control </li></ul><ul><li>Immature standards </li></ul><ul><li>VPNs need to accommodate protocols other than IP and existing internal network technology </li></ul>1-18
  10. 10. Applications: Site-to-Site VPNs <ul><li>Large-scale encryption between multiple fixed sites such as remote offices and central offices </li></ul><ul><li>Network traffic is sent over the branch office Internet connection </li></ul><ul><li>This saves the company hardware and management expenses </li></ul>1-18
  11. 11. Site-to-Site VPNs 1-18
  12. 12. Applications: Remote Access <ul><li>Encrypted connections between mobile or remote users and their corporate networks </li></ul><ul><li>Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server. </li></ul><ul><li>Ideal for a telecommuter or mobile sales people. </li></ul><ul><li>VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable </li></ul>1-18
  13. 13. Industries That May Use a VPN <ul><li>Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider </li></ul><ul><li>Manufacturing : allow suppliers to view inventory & allow clients to purchase online safely </li></ul><ul><li>Retail: able to securely transfer sales data or customer info between stores & the headquarters </li></ul><ul><li>Banking/Financial: enables account information to be transferred safely within departments & branches </li></ul><ul><li>General Business: communication between remote employees can be securely exchanged </li></ul>1-18
  14. 14. Some Businesses using a VPN <ul><li>CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN </li></ul><ul><li>ITW Foilmark secured remote location orders, running reports, & internet/intranet communications w/ a 168-bit encryption by switching to OpenReach VPN </li></ul><ul><li>Bacardi & Co. Implemented a 21-country- 44-location VPN </li></ul>1-18
  15. 15. FUTURE OF VPNs <ul><li>VPNs are continually being enhanced. </li></ul><ul><li>As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. </li></ul><ul><li>Networks are expected to converge to create an integrated VPN </li></ul><ul><li>Improved protocols are expected, which will also improve VPNs. </li></ul>1-18
  16. 16. <ul><li>In my conclusion virtual private network is an, </li></ul><ul><li>Eliminating the need for expensive long-distance leased lines </li></ul><ul><li>Reducing the long-distance telephone charges for remote access. </li></ul><ul><li>Transferring the support burden to the service providers </li></ul><ul><li>Operational costs </li></ul><ul><li>Flexibility of growth </li></ul><ul><li>Efficiency with broadband technology </li></ul>
  17. 17. 1:Feilner, Markus. &quot;Chapter 1 - VPN—Virtual Private Network&quot;. OpenVPN: Building and Integrating Virtual Private Networks: Learn How to Build Secure VPNs Using this Powerful Open Source Application. Packt Publishing. 2: Address Allocation for Private Internets, RFC 1918, Y. Rekhter et al. 3: RFC 2917, A Core MPLS IP VPN Architecture 4: Layer Two Tunneling Protocol &quot;L2TP&quot;, RFC 2661, W. Townsley et al. 5: IP Based Virtual Private Networks, RFC 2341, A. Valencia et al 6: Point-to-Point Tunneling Protocol (PPTP), RFC 2637, K. Hamzeh et al. 7: Http://en.wikipedia.org/wiki/vpn

×