SlideShare ist ein Scribd-Unternehmen logo
1 von 19
www.oeclib.in
Submitted By:
Odisha Electronic Control Library
Seminar
On
Virtual Private Networks
(VPN)
Content
 What is VPN
 Types of VPN’s
 How does it work?
 Protocols
 Security: Firewalls
 VPN Devices
 Advantages
 Disadvantages
 Features
 Future
 Conclusion
What is VPN
 Virtual Private Network is a
type of private network that
uses public telecommunication,
such as the Internet, instead of
leased lines to communicate.
 Became popular as more
employees worked in remote
locations.
 Terminologies to understand
how VPNs work.
Types of VPN’s
 Remote-Access VPN
 Site-to-Site VPN (Intranet-based)
 Site-to-Site VPN (Extranet-based)
Remote-Access VPN
 A remote access VPN is for home or travelling
users who need to access their central LAN from a
remote location.
 They dial their ISP and connect over the internet
to the LAN.
 This is made possible by installing a client software
program on the remote user’s laptop or PC that
deals with the encryption and decryption of the
VPN traffic between itself and the VPN gateway on
the central LAN.
Site-to-Site VPN
 Intranet-based - If a company has one or more
remote locations that they wish to join in a single
private network, they can create an intranet VPN
to connect LAN to LAN.
 Extranet-based - When a company has a close
relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that
allows all of the various companies to work in a
shared environment.
All 3 types of VPN
Protocols used in VPN
 PPTP - Point-to-point tunneling protocol
 L2Tp – Layers to Tunneling Protocol
 IPSec - Internet protocol security
 SSL – is not used as much as the ones above.
 Encryption
VPN Security: Firewall
A well-designed VPN uses several methods for keeping
your connection and data secure:
 Firewalls
 Encryption
 IPSec
 AAA Server
 You can set firewalls to restrict the number of open
ports, what type of packets are passed through and
which protocols are allowed through.
VPN Devices
 Hardware
 Firewall
 Software
VPN Advantages
 Multiple telephone lines and banks of modems at the
central site are not required.
 A reduction in the overall telecommunication
infrastructure – as the ISP provides the bulk of the
network.
 Reduced cost of management, maintenance of
equipment and technical support.
 Simplifies network topology by eliminating modem
pools and a private network infrastructure.
 VPN functionality is already present in some IT
equipment.
VPN Disadvantage
 If the ISP or Internet connection is down, so is the
VPN.
 The central site must have a permanent internet
connection so that remote clients and other sites can
connect at anytime.
 VPNs may provide each user with less bandwidth than
a dedicated line solution.
 Existing firewalls, proxies, routers and hubs may not
support VPN transmissions.
VPN Features
 Security – tunneling support between sites with at
least 128bit encryption of the data.
 Scalability – extra users and bandwidth can be added
easily to adapt to new requirements.
 Services – quality of service features, including
bandwidth, management and traffic shaping, are
important to avoid congestion.
 Management – reports on user activity, management
of user policies and monitoring of the VPN as a whole.
Future of VPN
 VPN popularity
 Companies choosing VPN
 Cost efficient?
 New way of communicating?
Future of VPN: Companies with
VPN
Conclusion
 As we have gone through all possible details we
conclude that VPN is the best option for the corporate
networking.
 As many companies need to have access to Internet
and hence security is also the main concern.
 VPN provides best possible combination of security
and private network capabilities with adequate cost –
saving to the companies who are presently working
with leased lines.
References
 www.studymafia.org
 www.google.com
THANKS

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 

Ähnlich wie Virtual Private Networks (VPN) ppt

VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
tahaniali27
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
mocec17097
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 

Ähnlich wie Virtual Private Networks (VPN) ppt (20)

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
VirtualPrivateNetwork.ppt
VirtualPrivateNetwork.pptVirtualPrivateNetwork.ppt
VirtualPrivateNetwork.ppt
 
About vpn network .ppt
About vpn network .pptAbout vpn network .ppt
About vpn network .ppt
 
VPN mean .ppt
VPN mean .pptVPN mean .ppt
VPN mean .ppt
 
Virtual Private Network Presentation.ppt
Virtual Private Network Presentation.pptVirtual Private Network Presentation.ppt
Virtual Private Network Presentation.ppt
 
Vpn
VpnVpn
Vpn
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 

Mehr von OECLIB Odisha Electronics Control Library

Mehr von OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Virtual Private Networks (VPN) ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronic Control Library Seminar On Virtual Private Networks (VPN)
  • 2. Content  What is VPN  Types of VPN’s  How does it work?  Protocols  Security: Firewalls  VPN Devices  Advantages  Disadvantages  Features  Future  Conclusion
  • 3. What is VPN  Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  Became popular as more employees worked in remote locations.  Terminologies to understand how VPNs work.
  • 4. Types of VPN’s  Remote-Access VPN  Site-to-Site VPN (Intranet-based)  Site-to-Site VPN (Extranet-based)
  • 5. Remote-Access VPN  A remote access VPN is for home or travelling users who need to access their central LAN from a remote location.  They dial their ISP and connect over the internet to the LAN.  This is made possible by installing a client software program on the remote user’s laptop or PC that deals with the encryption and decryption of the VPN traffic between itself and the VPN gateway on the central LAN.
  • 6. Site-to-Site VPN  Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.  Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 7. All 3 types of VPN
  • 8.
  • 9. Protocols used in VPN  PPTP - Point-to-point tunneling protocol  L2Tp – Layers to Tunneling Protocol  IPSec - Internet protocol security  SSL – is not used as much as the ones above.  Encryption
  • 10. VPN Security: Firewall A well-designed VPN uses several methods for keeping your connection and data secure:  Firewalls  Encryption  IPSec  AAA Server  You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.
  • 11. VPN Devices  Hardware  Firewall  Software
  • 12. VPN Advantages  Multiple telephone lines and banks of modems at the central site are not required.  A reduction in the overall telecommunication infrastructure – as the ISP provides the bulk of the network.  Reduced cost of management, maintenance of equipment and technical support.  Simplifies network topology by eliminating modem pools and a private network infrastructure.  VPN functionality is already present in some IT equipment.
  • 13. VPN Disadvantage  If the ISP or Internet connection is down, so is the VPN.  The central site must have a permanent internet connection so that remote clients and other sites can connect at anytime.  VPNs may provide each user with less bandwidth than a dedicated line solution.  Existing firewalls, proxies, routers and hubs may not support VPN transmissions.
  • 14. VPN Features  Security – tunneling support between sites with at least 128bit encryption of the data.  Scalability – extra users and bandwidth can be added easily to adapt to new requirements.  Services – quality of service features, including bandwidth, management and traffic shaping, are important to avoid congestion.  Management – reports on user activity, management of user policies and monitoring of the VPN as a whole.
  • 15. Future of VPN  VPN popularity  Companies choosing VPN  Cost efficient?  New way of communicating?
  • 16. Future of VPN: Companies with VPN
  • 17. Conclusion  As we have gone through all possible details we conclude that VPN is the best option for the corporate networking.  As many companies need to have access to Internet and hence security is also the main concern.  VPN provides best possible combination of security and private network capabilities with adequate cost – saving to the companies who are presently working with leased lines.