The document discusses VPNs including what they are, types of VPNs, how they work, protocols used, security features, devices used, advantages, disadvantages and the future of VPNs. It provides details on remote access VPNs, site to site VPNs and the protocols and security methods used in VPNs.
The document discusses VPNs including what they are, types of VPNs, how they work, protocols used, security features, devices used, advantages, disadvantages and the future of VPNs. It provides details on remote access VPNs, site to site VPNs and the protocols and security methods used in VPNs.
The document discusses VPNs including what they are, types of VPNs, how they work, protocols used, security features, devices used, advantages, disadvantages and the future of VPNs. It provides details on remote access VPNs, site to site VPNs and the protocols and security methods used in VPNs.
The document discusses VPNs including what they are, types of VPNs, how they work, protocols used, security features, devices used, advantages, disadvantages and the future of VPNs. It provides details on remote access VPNs, site to site VPNs and the protocols and security methods used in VPNs.
www.studymafia.org www.studymafia.org Content What is VPN Types of VPN’s How does it work? Protocols Security: Firewalls VPN Devices Advantages Disadvantages Features Future Conclusion What is VPN Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.
Became popular as more
employees worked in remote locations.
Terminologies to understand how VPNs work. Types of VPN’s Remote-Access VPN
Site-to-Site VPN (Intranet-based)
Site-to-Site VPN (Extranet-based)
Remote-Access VPN A remote access VPN is for home or travelling users who need to access their central LAN from a remote location. They dial their ISP and connect over the internet to the LAN. This is made possible by installing a client software program on the remote user’s laptop or PC that deals with the encryption and decryption of the VPN traffic between itself and the VPN gateway on the central LAN. Site-to-Site VPN Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment. All 3 types of VPN Protocols used in VPN PPTP - Point-to-point tunneling protocol L2Tp – Layers to Tunneling Protocol IPSec - Internet protocol security SSL – is not used as much as the ones above. Encryption VPN Security: Firewall A well-designed VPN uses several methods for keeping your connection and data secure: Firewalls Encryption IPSec AAA Server
You can set firewalls to restrict the number of open
ports, what type of packets are passed through and which protocols are allowed through. VPN Devices Hardware
Firewall
Software VPN Advantages
Multiple telephone lines and banks of modems at the
central site are not required. A reduction in the overall telecommunication infrastructure – as the ISP provides the bulk of the network. Reduced cost of management, maintenance of equipment and technical support. Simplifies network topology by eliminating modem pools and a private network infrastructure. VPN functionality is already present in some IT equipment. VPN Disadvantage If the ISP or Internet connection is down, so is the VPN. The central site must have a permanent internet connection so that remote clients and other sites can connect at anytime. VPNs may provide each user with less bandwidth than a dedicated line solution. Existing firewalls, proxies, routers and hubs may not support VPN transmissions. VPN Features Security – tunneling support between sites with at least 128bit encryption of the data. Scalability – extra users and bandwidth can be added easily to adapt to new requirements. Services – quality of service features, including bandwidth, management and traffic shaping, are important to avoid congestion. Management – reports on user activity, management of user policies and monitoring of the VPN as a whole. Future of VPN VPN popularity ▪ Companies choosing VPN ▪ Cost efficient? ▪ New way of communicating? Future of VPN: Companies with VPN Conclusion As we have gone through all possible details we conclude that VPN is the best option for the corporate networking. As many companies need to have access to Internet and hence security is also the main concern. VPN provides best possible combination of security and private network capabilities with adequate cost – saving to the companies who are presently working with leased lines. References www.studymafia.org www.google.com www.wikipedia.com THANKS