SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Presented by:


Kajal P. Thakkar     3161
Alpa G. Chauhan     3091
Suja S. Nair       3116
A technology that creates a network that is
 physically public, but virtually private.

 VPNs typically require remote users of the
 network to be authenticated, and often
 secure data with encryption technologies to
 prevent disclosure of private information to
 unauthorized parties.
 Earlier   there was
1. Private   Network .

 Completely isolated network is established.
 It creates its own TCPIP internet .
 Leased lines .


 Isolated from   world .
 Costlier .
 Uses  advantages of private and global
  internet.

 Privatization   is done by leased lines .

 Cost   inefficient .
Leased lines


                                 s
                            l ine
                         ed
Le es




                      as
  lin




                 Le
   as
      ed




           Leased l
                   ines
Virtual Private Networks (VPN)
Basic Architecture
A  virtual private network (VPN) is a secure way of
 connecting to a private Local Area Network at a
 remote location, using the Internet or any
 unsecure public network to transport the network
 data packets privately, using encryption. The VPN
 uses authentication to deny access to unauthorized
 users, and encryption to prevent unauthorized
 users from reading the private network packets.
 The VPN can be used to send any kind of network
 traffic securely, including voice, video or data.
 VIRTUAL   .

 PRIVATE   .

 NETWORK       .
 TUNNELING.

 ENCRYPTION.

 ENCAPSULATION.

 AUTHENTICATION.

 FIREWALL.
TUNNELING
•    Virtual private network technology is based on the idea of
    tunneling.

•    VPN tunneling involves establishing and maintaining a logical
    network connection .


•   Tunneling is the process of placing an entire packet within
    another packet before it's transported over the Internet.

•    That outer packet protects the contents from public view and
    ensures that the packet moves within a virtual tunnel.
   On this connection, packets constructed in a
    specific VPN protocol format are encapsulated
    within some other base or carrier protocol, then
    transmitted between VPN client and server, and
    finally de-encapsulated on the receiving side.
     allows senders to encapsulate their data in IP
       packets that hide the routing and switching
       infrastructure of the Internet
     to ensure data security against unwanted viewers,
       or hackers.
1.Voluntary.

2. compulsory.
 In voluntary tunneling, the VPN client manages
  connection setup.
 The client first makes a connection to the
  carrier network provider (an ISP in the case of
  Internet VPNs).
 Then, the VPN client application creates the
  tunnel to a VPN server over this live
  connection.
 Incompulsory tunneling, the carrier network
  provider manages VPN connection setup.
 When  the client first makes an ordinary
  connection to the carrier, the carrier in turn
  immediately brokers a VPN connection
  between that client and a VPN server.
 From the client point of view, VPN
  connections are set up in just one step
  compared to the two-step procedure
 Compulsory      tunneling hides the details of
    VPN server connectivity from the VPN clients
    and effectively transfers management control
    over the tunnels from clients to the ISP.
    In return, service providers must take on the
    additional burden of installing and maintaining
    FEP devices.
 Point-to-Point Tunneling Protocol (PPTP)
 Layer Two Tunneling Protocol (L2TP)
 Internet Protocol Security (IPsec)
 It’s the most widely supported VPN method
    among Windows users and it was created by
    Microsoft in association with other technology
    companies.

    compared to other methods, PPTP is faster and
    it is also available for Linux and Mac users. .

 Voluntary   tunneling method.
   L2TP (Layer 2 Tunneling Protocol) it’s
    another tunneling protocol that supports VPNs.

    The difference between PPTP and L2TP is that
    the second one provides not only data
    confidentiality but also data integrity.

    L2TP was developed by Microsoft and Cisco as
    a combination between PPTP and L2F(Layer 2
    Forwarding).
 IPsec  is actually a collection of multiple related
    protocols.

 It  can be used as a complete VPN protocol
    solution or simply as the encryption scheme
    within L2TP or PPTP.

    IPsec exists at the network layer (Layer Three)
    of the OSI model.
 Encryption is the process of encoding data so
 that only a computer with the right decoder
 will be able to read and use it.


 TheVPN client at each end of the tunnel
 encrypt the data entering the tunnel and
 decrypt it at the other end .
There are most two common forms of
 encryption

1   . symmetric-key encryption
2   . public-key Encryption
 Authentication    process determine if the
    sender is the authorized person and if the
    data has been redirect or corrupted .

 There   are 2 levels of Authentication.

     Computer-Level Authentication
     User-level Authentication
 Firewall  provides network security and business
    continuity .
    It prevents attacks, and secures your data
    communications with multiple parallel Virtual Private
    Network (VPN) connections.
 There  are two approaches to using a firewall with a
    VPN server:
   VPN server in front of the firewall..
   VPN server behind the firewall..
 For  data encapsulation, VPN relies on either
  of the following technologies like GRE , IPSec,
  L2F,PPTP and L2TP .

 In   which IPsec and PPTP are more popular.
 Alltraffic on the secure VPN must be
  encrypted and authenticated.

 The security properties of the VPN must be
  agreed to by all parties in the VPN.

 No  one outside the VPN can affect the
  security properties of the VPN.
 Remote access   VPN
 Intranet VPN
 Extranet VPN
A  remote-access VPN allows individual
  users to establish secure connections with a
  remote computer network.
 There are two components required in a
  remote-access VPN. The first is a network
  access server(NAS).
 The other required component of remote-
  access VPNs is client software
     Intranet VPNs link corporate headquarters,
    remote offices, and branch offices over a
    shared infrastructure using dedicated
    connections.

 The    benefits of an intranet VPN are as
    follows:
      - Reduces WAN bandwidth costs
      - Connect new sites easily
       
 Extranet  VPNs link customers, suppliers,
 partners, or communities of interest to a
 corporate intranet over a shared
 infrastructure using dedicated connections. In
 this example, the VPN is often an alternative
 to fax, snail mail, or EDI. The extranet VPN
 facilitates e-commerce.
   Security -- The VPN should protect data while it's
    traveling on the public network. If intruders attempt to
    capture the data, they should be unable to read or use it.



   Reliability -- Employees and remote offices should be
    able to connect to the VPN with no trouble at any time
    (unless hours are restricted), and the VPN should
    provide the same quality of connection for each user
    even when it is handling its maximum number of
    simultaneous connections.
 Cost   Savings

 Eliminating the need for expensive long-distance leased
  lines
 Reducing the long-distance telephone charges for
  remote access.
 Transferring the support burden to the service
  providers
 Operational costs
:   Scalability

 Flexibility   of growth

 Efficiency    with broadband technology
VPNs require detailed understanding of network
security issues and careful installation / configuration
to ensure sufficient protection on a public network
like the Internet.


 The reliability and performance of an Internet-
based VPN is not under an organization's direct
control. Instead, the solution relies on an ISP and
their quality of service.
 VPN products and solutions from different
 vendors have not always been compatible
 due to issues with VPN technology standards.
 Attempting to mix and match equipment may
 cause technical problems, and using equipment
 from one provider may not give as great a cost
 savings.
Vpn

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Vpn
VpnVpn
Vpn
 
Dmz
Dmz Dmz
Dmz
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
 

Ähnlich wie Vpn

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn securityEric Fedewa
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 

Ähnlich wie Vpn (20)

WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
V P N
V P NV P N
V P N
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn security
 
The vpn
The vpnThe vpn
The vpn
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Vpn

  • 1. Presented by: Kajal P. Thakkar 3161 Alpa G. Chauhan 3091 Suja S. Nair 3116
  • 2. A technology that creates a network that is physically public, but virtually private.  VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.
  • 3.  Earlier there was 1. Private Network .  Completely isolated network is established.  It creates its own TCPIP internet .  Leased lines .  Isolated from world .  Costlier .
  • 4.  Uses advantages of private and global internet.  Privatization is done by leased lines .  Cost inefficient .
  • 5. Leased lines s l ine ed Le es as lin Le as ed Leased l ines
  • 6. Virtual Private Networks (VPN) Basic Architecture
  • 7.
  • 8. A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.
  • 9.  VIRTUAL .  PRIVATE .  NETWORK .
  • 10.  TUNNELING.  ENCRYPTION.  ENCAPSULATION.  AUTHENTICATION.  FIREWALL.
  • 12. Virtual private network technology is based on the idea of tunneling. • VPN tunneling involves establishing and maintaining a logical network connection . • Tunneling is the process of placing an entire packet within another packet before it's transported over the Internet. • That outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.
  • 13.
  • 14. On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, and finally de-encapsulated on the receiving side.  allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet  to ensure data security against unwanted viewers, or hackers.
  • 16.  In voluntary tunneling, the VPN client manages connection setup.  The client first makes a connection to the carrier network provider (an ISP in the case of Internet VPNs).  Then, the VPN client application creates the tunnel to a VPN server over this live connection.
  • 17.  Incompulsory tunneling, the carrier network provider manages VPN connection setup.  When the client first makes an ordinary connection to the carrier, the carrier in turn immediately brokers a VPN connection between that client and a VPN server.  From the client point of view, VPN connections are set up in just one step compared to the two-step procedure
  • 18.  Compulsory tunneling hides the details of VPN server connectivity from the VPN clients and effectively transfers management control over the tunnels from clients to the ISP.  In return, service providers must take on the additional burden of installing and maintaining FEP devices.
  • 19.  Point-to-Point Tunneling Protocol (PPTP)  Layer Two Tunneling Protocol (L2TP)  Internet Protocol Security (IPsec)
  • 20.  It’s the most widely supported VPN method among Windows users and it was created by Microsoft in association with other technology companies.  compared to other methods, PPTP is faster and it is also available for Linux and Mac users. .  Voluntary tunneling method.
  • 21. L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that supports VPNs.   The difference between PPTP and L2TP is that the second one provides not only data confidentiality but also data integrity.  L2TP was developed by Microsoft and Cisco as a combination between PPTP and L2F(Layer 2 Forwarding).
  • 22.  IPsec is actually a collection of multiple related protocols.  It can be used as a complete VPN protocol solution or simply as the encryption scheme within L2TP or PPTP.  IPsec exists at the network layer (Layer Three) of the OSI model.
  • 23.
  • 24.  Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it.  TheVPN client at each end of the tunnel encrypt the data entering the tunnel and decrypt it at the other end .
  • 25. There are most two common forms of encryption 1 . symmetric-key encryption 2 . public-key Encryption
  • 26.
  • 27.  Authentication process determine if the sender is the authorized person and if the data has been redirect or corrupted .  There are 2 levels of Authentication.  Computer-Level Authentication  User-level Authentication
  • 28.  Firewall provides network security and business continuity .  It prevents attacks, and secures your data communications with multiple parallel Virtual Private Network (VPN) connections.  There are two approaches to using a firewall with a VPN server:  VPN server in front of the firewall..  VPN server behind the firewall..
  • 29.
  • 30.
  • 31.  For data encapsulation, VPN relies on either of the following technologies like GRE , IPSec, L2F,PPTP and L2TP .  In which IPsec and PPTP are more popular.
  • 32.
  • 33.  Alltraffic on the secure VPN must be encrypted and authenticated.  The security properties of the VPN must be agreed to by all parties in the VPN.  No one outside the VPN can affect the security properties of the VPN.
  • 34.  Remote access VPN  Intranet VPN  Extranet VPN
  • 35. A remote-access VPN allows individual users to establish secure connections with a remote computer network.  There are two components required in a remote-access VPN. The first is a network access server(NAS).  The other required component of remote- access VPNs is client software
  • 36.
  • 37. Intranet VPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.  The benefits of an intranet VPN are as follows:   - Reduces WAN bandwidth costs   - Connect new sites easily    
  • 38.
  • 39.  Extranet VPNs link customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure using dedicated connections. In this example, the VPN is often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e-commerce.
  • 40.
  • 41. Security -- The VPN should protect data while it's traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it.  Reliability -- Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections.
  • 42.  Cost Savings  Eliminating the need for expensive long-distance leased lines  Reducing the long-distance telephone charges for remote access.  Transferring the support burden to the service providers  Operational costs
  • 43. : Scalability  Flexibility of growth  Efficiency with broadband technology
  • 44. VPNs require detailed understanding of network security issues and careful installation / configuration to ensure sufficient protection on a public network like the Internet. The reliability and performance of an Internet- based VPN is not under an organization's direct control. Instead, the solution relies on an ISP and their quality of service.
  • 45.  VPN products and solutions from different vendors have not always been compatible due to issues with VPN technology standards. Attempting to mix and match equipment may cause technical problems, and using equipment from one provider may not give as great a cost savings.

Hinweis der Redaktion

  1. A “tunnel” is simply a link between two locations through some other material. A good analogy is a tunnel that goes under a mountain. Both sides of the mountain are linked up through a direct path; in this case the “mountain” is the Internet. So essentially a tunnel is a direct shortcut through the Internet. Let’s say you have a branch office in one location using a regular Internet connection and then you want to connect to a server somewhere at your main office location. Since the data you are transferring between offices is likely sensitive, you wouldn’t want someone to be able to view that data while traveling over the Internet. That is where a VPN tunnel comes into play.
  2. In other words, employees who want to use the VPN from their computers require software on those computers that can establish and maintain a connection to the VPN Employee to Business…..
  3. A NAS might be a dedicated server, or it might be one of multiple software applications running on a shared server. It's a NAS that a user connects to from the Internet in order to use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN. To authenticate the user's credentials, the NAS uses either its own authentication process or a separate authentication server running on the network.