SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Virtual Private Network
(VPN)
A VPN, or Virtual Private Network, allows you to
create a secure connection to another network
over the Internet. VPNs can be used to access
region-restricted websites, shield your browsing
activity from prying eyes on public Wi-Fi, and
more
What’s VPN???
Why we use or need VPN???
It secures your computer’s
internet connection to
guarantee that all of the data
you’re sending and receiving
is encrypted and secured
from prying eyes.
The most important thing
you need to know about a
VPN:
Virtual Private Network (VPN)
The origin of VPN
 The word VPN originates from three words i.e.
 Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between
two or more devices is achieved. Therefore, the communication is virtually but not physically there.
 Private: Private means to keep something a secret from the general public. Although those two devices are
communicating with each other in a public environment, there is no third party who can interrupt this
communication or receive any data that is exchanged between them.
 Network: A network consists of two or more devices that can freely and electronically communicate with
each other via cables and wire. A VPN is a network. It can transmit information over long distances
effectively and efficiently.
 User Authentication : VPN must be able to verify user authentication and allow only authorized
users to access the network
Requirement VPN:
 Address Management : Assign addresses to clients and ensure that private addresses are kept private on the
VPN.
 Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP,
IPX etc
 Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data
 Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note
that keys are required for encryption
Types of VPN :
 Intranet VPN.
 Extranet VPN.
 Remote access VPN.
The Intranet VPN
Intranet VPNs link corporate
headquarters, remote offices, and branch
offices over a shared infrastructure using
dedicated connections. The VPN typically
is an alternative to a leased line. It
provides the benefit of extended
connectivity and lower cost.
The Extranet VPN
Extranet VPNs link customers,
suppliers, partners, or
communities of interest to a
corporate intranet over a shared
infrastructure using dedicated
connections. In this example,
the VPN is often an alternative to
fax, snail mail, or EDI. The
extranet VPN facilitates e-
commerce
Remote Access VPN
A remote-access VPN allows
individual users to establish secure
connections with a remote computer
network. Those users can access the
secure resources on that network as if
they were directly plugged in to the
network's servers. An example of a
company that needs a remote-access
VPN is a large firm with hundreds of
salespeople in the field. Another name
for this type of VPN is virtual private
dial-up network (VPDN),
acknowledging that in its earliest form,
a remote-access VPN required dialing
in to a server using an analog
telephone system.
Tunneling
 Tunnelling involves the encapsulation,
transmission and de-capsulation of data packets.
 The data is encapsulated with additional headers.
 The additional headers provide routing
information for encapsulated data to be routed
between the end points of a tunnel.
 Requires 3 protocols
1) Carrier, Default network protocol
2) Passenger ,Original data
3) Encapsulation GRE, IPsec , PPTP etc.
Tunnel Types
 Voluntary
 VPN request is initiated by the client.
 The client remains the end point.
 Compulsory
 VPN access server creates a compulsory tunnel for the client.
 In this case, the dial-up access server between the user’s computer and the tunnel
server is the tunnel end point that acts as a client .
 Voluntary tunneling is used in most applications.
Advantages :
 Greater scalability
 Easy to add/remove users
 Reduced long-distance
telecommunications costs
 Mobility
 Security
 Disadvantages :
 Lack of standards
 Understanding of security issues
 Unpredictable Internet traffic
 Difficult to accommodate
products from different vendors
Advantages and Disadvantages of VPN :
Thanks for your ATTENTION!
Any Question???

Weitere ähnliche Inhalte

Was ist angesagt?

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
jadeja dhanraj
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 

Was ist angesagt? (20)

VPN
VPNVPN
VPN
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 

Ähnlich wie Vpn-Virtual Private Network

The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 

Ähnlich wie Vpn-Virtual Private Network (20)

Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
The vpn
The vpnThe vpn
The vpn
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Vpn-Virtual Private Network

  • 2. A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more What’s VPN???
  • 3. Why we use or need VPN??? It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. The most important thing you need to know about a VPN:
  • 5. The origin of VPN  The word VPN originates from three words i.e.  Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved. Therefore, the communication is virtually but not physically there.  Private: Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.  Network: A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
  • 6.  User Authentication : VPN must be able to verify user authentication and allow only authorized users to access the network Requirement VPN:  Address Management : Assign addresses to clients and ensure that private addresses are kept private on the VPN.  Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP, IPX etc  Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data  Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note that keys are required for encryption
  • 7. Types of VPN :  Intranet VPN.  Extranet VPN.  Remote access VPN.
  • 8. The Intranet VPN Intranet VPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. The VPN typically is an alternative to a leased line. It provides the benefit of extended connectivity and lower cost.
  • 9. The Extranet VPN Extranet VPNs link customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure using dedicated connections. In this example, the VPN is often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e- commerce
  • 10. Remote Access VPN A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers. An example of a company that needs a remote-access VPN is a large firm with hundreds of salespeople in the field. Another name for this type of VPN is virtual private dial-up network (VPDN), acknowledging that in its earliest form, a remote-access VPN required dialing in to a server using an analog telephone system.
  • 11. Tunneling  Tunnelling involves the encapsulation, transmission and de-capsulation of data packets.  The data is encapsulated with additional headers.  The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel.  Requires 3 protocols 1) Carrier, Default network protocol 2) Passenger ,Original data 3) Encapsulation GRE, IPsec , PPTP etc.
  • 12. Tunnel Types  Voluntary  VPN request is initiated by the client.  The client remains the end point.  Compulsory  VPN access server creates a compulsory tunnel for the client.  In this case, the dial-up access server between the user’s computer and the tunnel server is the tunnel end point that acts as a client .  Voluntary tunneling is used in most applications.
  • 13. Advantages :  Greater scalability  Easy to add/remove users  Reduced long-distance telecommunications costs  Mobility  Security  Disadvantages :  Lack of standards  Understanding of security issues  Unpredictable Internet traffic  Difficult to accommodate products from different vendors Advantages and Disadvantages of VPN :
  • 14. Thanks for your ATTENTION! Any Question???