A technology that creates a network that is physically public, but virtually private
That is a Secure way of adding an extra level of privacy to your online activity Like web surfing.
2. WHAT IS VPN?
•A technology that creates a network that is
physically public, but virtually private
•That is a Secure way of adding an extra level of
privacy to your online activity Like web surfing.
5. TYPES OF VPN
There are two basic VPN types which are explained below.
Remote Access VPN
Site – to – Site VPN
• Intranet VPN
• Extranet VPN
6. REMOTE ACCESS VPN
• A remote-access VPN allows individual users to establish secure
connections with a remote computer network.
• There are two components required in a remote-access VPN. The first
is a network access server(NAS).
• The other required component of remote-access VPNs is client
software
• Remote Access VPN is useful for business users as well as home
users.
• Home users, or private users of VPN, primarily use VPN services to
bypass regional(ISP) restrictions on the Internet and access blocked
websites. sensible Users of Internet security also use VPN services
8. SITE – TO – SITE VPN
• A Site-to-Site VPN is also called as Router-to-Router VPN and is
mostly used in the corporates.
• Companies, with offices in different geographical locations, use Site-
to-site VPN to connect the network of one office location to the
network at another office location.
• Basically, Site-to-site VPN create a virtual connection between the
networks at geographically offices and connect them through the
Internet and maintain a secure and private communication between
the networks.
9. INTRANET VPN
• Intranet VPNs link corporate headquarters, remote offices,
and branch offices over a shared infrastructure using
dedicated connections.
10. EXTRANET VPN
• When companies use Site-to-site VPN type to connect to the office of
another company, it is called as Extranet based VPN.
11. TYPES OF VPN PROTOCOLS
i. Internet Protocol Security or IPsec
ii. Layer 2 Tunneling Protocol (L2TP)
iii. Point – to – Point Tunneling Protocol (PPTP)
iv. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
v. Open VPN
12. INTERNET PROTOCOL SECURITY OR IPSEC
• Internet Protocol Security or IPsec is used to secure Internet communication
across an IP network.
• IPsec secures Internet Protocol communication by authenticating the
session and encrypts each data packet during the connection.
• IPsec can also be used with other security protocols to enhance the security
system
• IPsec exists at the network layer (Layer Three) of the OSI model. Ex in IP v4
optional
• Transport mode to protect data transfer between two different networks.
• Tunneling mode to encrypts the message in the data packet and the
tunneling mode encrypts the entire data packet
13. LAYER 2 TUNNELING PROTOCOL (L2TP)
• L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that
supports VPNs.
• Layer 2 Tunneling Protocol is a tunneling protocol that is usually
combined with another VPN security protocol like IPsec to create a
highly secure VPN connection.
• L2TP creates a tunnel between two L2TP connection points and IPsec
protocol encrypts the data and handles secure communication
between the tunnel
• L2TP was developed by Microsoft and Cisco as a combination
between PPTP and L2F(Layer 2 Forwarding).
14. POINT – TO – POINT TUNNELING PROTOCOL
(PPTP)
• PPTP or Point-to-Point Tunneling Protocol creates a tunnel
and encapsulates the data packet. It uses a Point-to-Point
Protocol (PPP) to encrypt the data between the connection.
• PPTP is one of the most widely used VPN protocol and has
been use in of Windows 95.
• develop by the Microsoft.
• compared to other methods, PPTP is faster
15. SSL AND TLS
• SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a
VPN connection where the web browser acts as the client and user access
is limited to specific applications in the whole network.
• SSL and TLS protocol is most commonly used by online shopping websites
and service providers.
• SSL connections have https in the beginning of the URL instead of http.
16. OPEN VPN
• Open VPN is an open source VPN that is useful for creating Point-to-
Point and Site-to-Site connections. It uses a custom security protocol
based on SSL and TLS protocol.
17. FIREWALL CONFIGURATION
• Firewall provides network security and business continuity .
• It prevents attacks, and secures your data communications with
multiple parallel Virtual Private Network (VPN) connections.
• There are two approaches to using a firewall with a VPN server:
VPN server in front of the firewall..
VPN server behind the firewall..
20. BENEFITS OF VPN
i. Access Blocked Websites & Avoid
Geographical Restrictions.
ii.Online Security & Privacy:
iii.Public Wi-Fi Security:
iv.Secure Connection to Remote Networks
v.Anonymous Browsing
21. ACCESS BLOCKED WEBSITES & AVOID
GEOGRAPHICAL RESTRICTIONS.
• VPN allows a user to access blocked websites and
circumvent geographical restrictions.
• Some countries keep restrictions on certain websites and
block these websites from being accessed by people living
in that country. This is called as Geo-blocking of the
websites. VPNs have a work around for this too and is more
popular for enabling users to access websites which are
otherwise blocked in their region or country
22. ONLINE SECURITY & PRIVACY:
•Our VPN uses high strength 256-bit encryption to
protect your data from spoofing eyes. Browse freely
from Wi-Fi hotspots with the comfort that you can’t
be tracked or monitored.
•It protects you from the prying(spoofing) eyes of
hackers and snoopers who want to capture your
passwords and personal information
23. PUBLIC WI-FI SECURITY:
• A VPN increases the security when connected to a public Wi-Fi
network.
• Public Wi-Fi networks like the ones you would find in a coffee shop or
in a hotel room are not as safe and secure as one might believe they
would be. Most public Wi-Fi networks are insecure and open since
they lack public Wi-Fi security encryption.
• It is easiest to hack or snoop into your connection when you are
connected through a public Wi-Fi network. If a user is connected on a
public Wi-Fi or an untrusted network (such as in a hotel, coffee shop,
other public places, etc.), the browsing activity of the user on non-
https websites could easily be snooped upon. Using Wireshark and
others
24. SECURE CONNECTION TO REMOTE
NETWORKS
• VPNs also allow users to connect to remote network securely.
• Most business use Virtual Private Network to allow their employees to
access their company’s private network securely while being
physically away from the company premises. The employees could be
traveling around the world and still connect to the secure private
network of their company to access files, applications, and other
resources on the office network.
25. ANONYMOUS(SECRET) BROWSING
• VPN service enables a user to browse through the Internet completely
anonymously(secret).
• A lot of people who are concerned about their security and privacy
prefer to browse the Internet anonymously. A VPN connection would
create a secure encrypted tunnel between a user’s computer or
mobile device to the VPN Server, enabling the user to carry out online
activities anonymously.
26. DISADVANTAGES OF VPN
• VPNs require detailed understanding of network security issues and
careful installation / configuration to ensure necessary protection on a
public network like the Internet.
• The reliability and performance of an Internet-based VPN is not
under an organization's direct control. Instead, the solution relies on
an ISP and their quality of service.
27. PRACTICAL EXAMPLE
• My Recommended website of VPN.
“WWW.VPNBOOK.COM”
1st of all open the vpnbook.com and select on PPTP Tab.
28. STEP:2
• Then open the CONTROL PANEL and select the NETWORK AND
SHARING CENTER.
29. STEP:3
• Select the SET UP A NEW CONNECTION and select the
CONNECT TO A WORK PLACE.
30. STEP:4
• Select NO CREATE A NEW CONNECTION.
• Select USE MY INTERNET CONNECT (VPN)
31. STEP:5
• Type the VPN server Address or name of the server then click on
create.
“EURO217.VPNBOOK.COM”
32. STEP:6
• Click on the NETWORK ICON
• Click on VPNBOOK EURO (type in pervious step)
• Then click on CONNECT and then type the USER NAME and
PASSWORD of the VPN server from VPNBOOK.COM and click on ok