SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Presented by:
Debasis Chowdhury – 10208016
Md. Shariar Islam – 10208026
Antara Chowdhury – 10208036
University of Asia Pacific
 A technology that creates a network that is
physically public, but virtually private.
Leased lines
Leased lines
Leased lines
Leased
lines
Virtual Private Networks (VPN)
Basic Architecture
 VIRTUAL .
 PRIVATE .
 NETWORK .
TUNNELING.
ENCRYPTION.
ENCAPSULATION.
AUTHENTICATION.
FIREWALL.
•Tunneling is the process of placing an entire packet within another
packet before it's transported over the Internet.
• That outer packet protects the contents from public view and
ensures that the packet moves within a virtual tunnel.
 Point-to-Point Tunneling Protocol (PPTP)
 Layer Two Tunneling Protocol (L2TP)
 Internet Protocol Security (IPsec)
Encryption is the process of encoding data so
that only a computer with the right decoder
will be able to read and use it.
 Used to convert data to a secret code for
transmission over an trusted network
Encryption
Algorithm
“The cow jumped
over the moon”
“4hsd4e3mjvd3sd
a1d38esdf2w4d”
Clear TextClear Text Encrypted TextEncrypted Text
 For data encapsulation, VPN relies on either
of the following technologies like GRE , IPSec,
L2F,PPTP and L2TP .
 In which IPsec and PPTP are more popular.
 Authentication process determine if the
sender is the authorized person and if the
data has been redirect or corrupted .
 There are 2 levels of Authentication.
 Computer-Level Authentication
 User-level Authentication
 Firewall provides network security and business
continuity .
 It prevents attacks, and secures your data
communications with multiple parallel Virtual Private
Network (VPN) connections.
 There are two approaches to using a firewall with a
VPN server:
 VPN server in front of the firewall..
 VPN server behind the firewall..
 All traffic on the secure VPN must be
encrypted and authenticated.
 The security properties of the VPN must be
agreed to by all parties in the VPN.
 No one outside the VPN can affect the
security properties of the VPN.
 Remote access VPN
 Site to Site VPN
 Provides access to
internal corporate
network over the
Internet.
 Reduces long distance,
modem bank, and
technical support
costs.
InternetInternet
Corporate
Site
 Connects multiple
offices over Internet
 Reduces dependencies
on frame relay and
leased lines InternetInternet
Branch
Office
Corporate
Site
 Site-to-Site VPN
 Extranet VPN
▪ Provides business
partners access to critical
information (leads, sales
tools, etc)
▪ Reduces transaction and
operational costs
Corporate
Site
InternetInternet
Partner #1
Partner #2
 Site-to-Site VPN
 Intranet VPN:
Links corporate
headquarters, remote
offices, and branch offices
over a shared
infrastructure using
dedicated connections.
InternetInternet
LAN
clients
Database
Server
LAN clients with
sensitive data
 Security
 Reliability
 Cost Savings
 Expand Globally
 Easier
 No single point of failure
 Easier Network Management
 Lower bandwidth available compared
to dial-in line
 Inconsistent remote access
performance due to changes in Internet
connectivity
 No entrance into the network if the
Internet connection is broken
Virtual Private Network (VPN).

Weitere ähnliche Inhalte

Was ist angesagt?

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 

Was ist angesagt? (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
SD WAN
SD WANSD WAN
SD WAN
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Dmz
Dmz Dmz
Dmz
 
Vpn
VpnVpn
Vpn
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 

Ähnlich wie Virtual Private Network (VPN).

The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 

Ähnlich wie Virtual Private Network (VPN). (20)

Vpn
VpnVpn
Vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
The vpn
The vpnThe vpn
The vpn
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
vpn
vpnvpn
vpn
 
Vpn
Vpn Vpn
Vpn
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
V P N
V P NV P N
V P N
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
VPN
VPNVPN
VPN
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
 

Kürzlich hochgeladen

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Kürzlich hochgeladen (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Virtual Private Network (VPN).

  • 1. Presented by: Debasis Chowdhury – 10208016 Md. Shariar Islam – 10208026 Antara Chowdhury – 10208036 University of Asia Pacific
  • 2.  A technology that creates a network that is physically public, but virtually private.
  • 3. Leased lines Leased lines Leased lines Leased lines
  • 4. Virtual Private Networks (VPN) Basic Architecture
  • 5.  VIRTUAL .  PRIVATE .  NETWORK .
  • 7. •Tunneling is the process of placing an entire packet within another packet before it's transported over the Internet. • That outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.
  • 8.
  • 9.  Point-to-Point Tunneling Protocol (PPTP)  Layer Two Tunneling Protocol (L2TP)  Internet Protocol Security (IPsec)
  • 10. Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it.  Used to convert data to a secret code for transmission over an trusted network Encryption Algorithm “The cow jumped over the moon” “4hsd4e3mjvd3sd a1d38esdf2w4d” Clear TextClear Text Encrypted TextEncrypted Text
  • 11.  For data encapsulation, VPN relies on either of the following technologies like GRE , IPSec, L2F,PPTP and L2TP .  In which IPsec and PPTP are more popular.
  • 12.
  • 13.  Authentication process determine if the sender is the authorized person and if the data has been redirect or corrupted .  There are 2 levels of Authentication.  Computer-Level Authentication  User-level Authentication
  • 14.  Firewall provides network security and business continuity .  It prevents attacks, and secures your data communications with multiple parallel Virtual Private Network (VPN) connections.  There are two approaches to using a firewall with a VPN server:  VPN server in front of the firewall..  VPN server behind the firewall..
  • 15.
  • 16.
  • 17.  All traffic on the secure VPN must be encrypted and authenticated.  The security properties of the VPN must be agreed to by all parties in the VPN.  No one outside the VPN can affect the security properties of the VPN.
  • 18.  Remote access VPN  Site to Site VPN
  • 19.  Provides access to internal corporate network over the Internet.  Reduces long distance, modem bank, and technical support costs. InternetInternet Corporate Site
  • 20.  Connects multiple offices over Internet  Reduces dependencies on frame relay and leased lines InternetInternet Branch Office Corporate Site
  • 21.  Site-to-Site VPN  Extranet VPN ▪ Provides business partners access to critical information (leads, sales tools, etc) ▪ Reduces transaction and operational costs Corporate Site InternetInternet Partner #1 Partner #2
  • 22.  Site-to-Site VPN  Intranet VPN: Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. InternetInternet LAN clients Database Server LAN clients with sensitive data
  • 23.  Security  Reliability  Cost Savings  Expand Globally  Easier  No single point of failure  Easier Network Management
  • 24.  Lower bandwidth available compared to dial-in line  Inconsistent remote access performance due to changes in Internet connectivity  No entrance into the network if the Internet connection is broken

Hinweis der Redaktion

  1. A “tunnel” is simply a link between two locations through some other material. A good analogy is a tunnel that goes under a mountain. Both sides of the mountain are linked up through a direct path; in this case the “mountain” is the Internet. So essentially a tunnel is a direct shortcut through the Internet. Let’s say you have a branch office in one location using a regular Internet connection and then you want to connect to a server somewhere at your main office location. Since the data you are transferring between offices is likely sensitive, you wouldn’t want someone to be able to view that data while traveling over the Internet. That is where a VPN tunnel comes into play.