Virtual Private Network
(VPN)
A VPN, or Virtual Private Network, allows you to
create a secure connection to another network
over the Internet. VPNs can be used to access
region-restricted websites, shield your browsing
activity from prying eyes on public Wi-Fi, and
more
What’s VPN???
Why we use or need VPN???
It secures your computer’s
internet connection to
guarantee that all of the data
you’re sending and receiving
is encrypted and secured
from prying eyes.
The most important thing
you need to know about a
VPN:
Virtual Private Network (VPN)
The origin of VPN
 The word VPN originates from three words i.e.
 Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between
two or more devices is achieved. Therefore, the communication is virtually but not physically there.
 Private: Private means to keep something a secret from the general public. Although those two devices are
communicating with each other in a public environment, there is no third party who can interrupt this
communication or receive any data that is exchanged between them.
 Network: A network consists of two or more devices that can freely and electronically communicate with
each other via cables and wire. A VPN is a network. It can transmit information over long distances
effectively and efficiently.
 User Authentication : VPN must be able to verify user authentication and allow only authorized
users to access the network
Requirement VPN:
 Address Management : Assign addresses to clients and ensure that private addresses are kept private on the
VPN.
 Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP,
IPX etc
 Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data
 Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note
that keys are required for encryption
Types of VPN :
 Intranet VPN.
 Extranet VPN.
 Remote access VPN.
The Intranet VPN
Intranet VPNs link corporate
headquarters, remote offices, and branch
offices over a shared infrastructure using
dedicated connections. The VPN typically
is an alternative to a leased line. It
provides the benefit of extended
connectivity and lower cost.
The Extranet VPN
Extranet VPNs link customers,
suppliers, partners, or
communities of interest to a
corporate intranet over a shared
infrastructure using dedicated
connections. In this example,
the VPN is often an alternative to
fax, snail mail, or EDI. The
extranet VPN facilitates e-
commerce
Remote Access VPN
A remote-access VPN allows
individual users to establish secure
connections with a remote computer
network. Those users can access the
secure resources on that network as if
they were directly plugged in to the
network's servers. An example of a
company that needs a remote-access
VPN is a large firm with hundreds of
salespeople in the field. Another name
for this type of VPN is virtual private
dial-up network (VPDN),
acknowledging that in its earliest form,
a remote-access VPN required dialing
in to a server using an analog
telephone system.
Tunneling
 Tunnelling involves the encapsulation,
transmission and de-capsulation of data packets.
 The data is encapsulated with additional headers.
 The additional headers provide routing
information for encapsulated data to be routed
between the end points of a tunnel.
 Requires 3 protocols
1) Carrier, Default network protocol
2) Passenger ,Original data
3) Encapsulation GRE, IPsec , PPTP etc.
Tunnel Types
 Voluntary
 VPN request is initiated by the client.
 The client remains the end point.
 Compulsory
 VPN access server creates a compulsory tunnel for the client.
 In this case, the dial-up access server between the user’s computer and the tunnel
server is the tunnel end point that acts as a client .
 Voluntary tunneling is used in most applications.
Advantages :
 Greater scalability
 Easy to add/remove users
 Reduced long-distance
telecommunications costs
 Mobility
 Security
 Disadvantages :
 Lack of standards
 Understanding of security issues
 Unpredictable Internet traffic
 Difficult to accommodate
products from different vendors
Advantages and Disadvantages of VPN :
Thanks for your ATTENTION!
Any Question???

Vpn-Virtual Private Network

  • 1.
  • 2.
    A VPN, orVirtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more What’s VPN???
  • 3.
    Why we useor need VPN??? It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. The most important thing you need to know about a VPN:
  • 4.
  • 5.
    The origin ofVPN  The word VPN originates from three words i.e.  Virtual: Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved. Therefore, the communication is virtually but not physically there.  Private: Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.  Network: A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.
  • 6.
     User Authentication: VPN must be able to verify user authentication and allow only authorized users to access the network Requirement VPN:  Address Management : Assign addresses to clients and ensure that private addresses are kept private on the VPN.  Multi-protocol Support : The VPN technology must support commons protocols on the Internet such as IP, IPX etc  Data Encryption : Encrypt and decrypt the data to ensure that others on the not have access to the data  Key Management : Keys must be generated and refreshed for encryption at the server and the client. Note that keys are required for encryption
  • 7.
    Types of VPN:  Intranet VPN.  Extranet VPN.  Remote access VPN.
  • 8.
    The Intranet VPN IntranetVPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. The VPN typically is an alternative to a leased line. It provides the benefit of extended connectivity and lower cost.
  • 9.
    The Extranet VPN ExtranetVPNs link customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure using dedicated connections. In this example, the VPN is often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e- commerce
  • 10.
    Remote Access VPN Aremote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers. An example of a company that needs a remote-access VPN is a large firm with hundreds of salespeople in the field. Another name for this type of VPN is virtual private dial-up network (VPDN), acknowledging that in its earliest form, a remote-access VPN required dialing in to a server using an analog telephone system.
  • 11.
    Tunneling  Tunnelling involvesthe encapsulation, transmission and de-capsulation of data packets.  The data is encapsulated with additional headers.  The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel.  Requires 3 protocols 1) Carrier, Default network protocol 2) Passenger ,Original data 3) Encapsulation GRE, IPsec , PPTP etc.
  • 12.
    Tunnel Types  Voluntary VPN request is initiated by the client.  The client remains the end point.  Compulsory  VPN access server creates a compulsory tunnel for the client.  In this case, the dial-up access server between the user’s computer and the tunnel server is the tunnel end point that acts as a client .  Voluntary tunneling is used in most applications.
  • 13.
    Advantages :  Greaterscalability  Easy to add/remove users  Reduced long-distance telecommunications costs  Mobility  Security  Disadvantages :  Lack of standards  Understanding of security issues  Unpredictable Internet traffic  Difficult to accommodate products from different vendors Advantages and Disadvantages of VPN :
  • 14.
    Thanks for yourATTENTION! Any Question???