0% found this document useful (0 votes)
89 views

VPNpresentation

Virtual private networks (VPNs) allow employees to securely access a private company network from remote locations over the public Internet. VPNs use encryption, authentication, and tunneling protocols to create a secure connection between remote users and the company network. There are two main types of VPNs: remote access VPNs that allow individual users to connect from outside the office, and site-to-site VPNs that connect multiple office locations together. VPNs provide cost savings over traditional private networks by using lower-cost public Internet connections instead of private leased lines.

Uploaded by

Prajish Prakash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views

VPNpresentation

Virtual private networks (VPNs) allow employees to securely access a private company network from remote locations over the public Internet. VPNs use encryption, authentication, and tunneling protocols to create a secure connection between remote users and the company network. There are two main types of VPNs: remote access VPNs that allow individual users to connect from outside the office, and site-to-site VPNs that connect multiple office locations together. VPNs provide cost savings over traditional private networks by using lower-cost public Internet connections instead of private leased lines.

Uploaded by

Prajish Prakash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 26

VIRTUAL PRIVATE

NETWORKS (VPN)
BY:
Prajish Prakash
TRADITIONAL CONNECTIVITY
WHAT IS VPN?

Virtual Private Network is a type of private


network that uses public telecommunication, such
as the Internet, instead of leased lines to
communicate.

Became popular as more employees worked in


remote locations.

Terminologies to understand how VPNs work.


PRIVATE NETWORKS
VS.
VIRTUAL PRIVATE NETWORKS
Employees can access the network (Intranet) from remote
locations.

Secured networks.

The Internet is used as the backbone for VPNs

Saves cost tremendously from reduction of equipment


and maintenance costs.

Scalability
REMOTE ACCESS VIRTUAL
PRIVATE NETWORK
BRIEF OVERVIEW OF HOW IT
WORKS
Two connections – one is made to the Internet and the second is
made to the VPN.
Datagrams – contains data, destination and source information.
Firewalls – VPNs allow authorized users to pass through the
firewalls.
Protocols – protocols create the VPN tunnels.
FOUR CRITICAL FUNCTIONS

Authentication – validates that the data was sent from the sender.
Access control – limiting unauthorized users from accessing the
network.
Confidentiality – preventing the data to be read or copied as the data is
being transported.
Data Integrity – ensuring that the data has not been altered
ENCRYPTION

Encryption -- is a method of scrambling data before


transmitting it onto the Internet.

Public Key Encryption Technique

Digital signature – for authentication


TUNNELING

A virtual point-to-point connection


made through a public network. It transports
encapsulated datagrams. Original Datagram

Encrypted Inner Datagram

Datagram Header Outer Datagram Data Area

Data Encapsulation [From Comer]

Two types of end points:


 Remote Access
 Site-to-Site
FOUR PROTOCOLS USED IN VPN

PPTP -- Point-to-Point Tunneling Protocol

L2TP -- Layer 2 Tunneling Protocol

IPsec -- Internet Protocol Security

SSL(Secure Socket Layer) – is not used as much as the ones


above
VPN ENCAPSULATION OF PACKETS
TYPES OF IMPLEMENTATIONS

What does “implementation” mean in VPNs?

3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
VIRTUAL PRIVATE NETWORKS
(VPN)
BASIC ARCHITECTURE
Remote Access VPN:

Remote Access VPN permits a user to connect to a private network


and access all its services and resources remotely.
The connection between the user and the private network occurs
through the Internet and the connection is secure and private.
Remote Access VPN is useful for home users and business users
both.
SITE-TO-SITE VPN:

 A Site-to-Site VPN is also called as Router-to-


Router VPN and is commonly used in the large
companies. Companies or organizations, with
branch offices in different locations, use Site-to-
site VPN to connect the network of one office
location to the network at another office location.
 Intranet based VPN: When several offices of the same company
are connected using Site-to-Site VPN type, it is called as Intranet
based VPN.
 Extranet based VPN: When companies use Site-to-site VPN
type to connect to the office of another company, it is called as
Extranet based VPN.
ADVANTAGES
VS.
DISADVANTAGES
ADVANTAGES: COST SAVINGS

 Eliminating the need for expensive long-distance


leased lines
 Reducing the long-distance telephone charges for
remote access.
 Transferring the support burden to the service
providers
 Operational costs
ADVANTAGES: SCALABILITY

Flexibility of growth

Efficiency with broadband technology


DISADVANTAGES

VPNs require an in-depth understanding of public


network security issues and proper deployment of
precautions

Availability and performance depends on factors


largely outside of their control

Immature standards

VPNs need to accommodate protocols other than IP


and existing internal network technology
APPLICATIONS: SITE-TO-SITE
VPNS
Large-scale encryption between multiple fixed sites such as
remote offices and central offices

Network traffic is sent over the branch office Internet


connection

This saves the company hardware and management expenses


APPLICATIONS: REMOTE
ACCESS
Encrypted connections between mobile or remote
users and their corporate networks
Remote user can make a local call to an ISP, as
opposed to a long distance call to the corporate
remote access server.
Ideal for a telecommuter or mobile sales people.
VPN allows mobile workers & telecommuters to take
advantage of broadband connectivity.
i.e. DSL, Cable
INDUSTRIES THAT MAY USE A VPN
Healthcare: enables the transferring of confidential patient information within the medical
facilities & health care provider

Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely

Retail: able to securely transfer sales data or customer info between stores & the
headquarters

Banking/Financial: enables account information to be transferred safely within


departments & branches

General Business: communication between remote employees can be securely exchanged


WHERE DO WE SEE VPNS GOING
IN THE FUTURE?

VPNs are continually being enhanced.


Example: Equant NV
As the VPN market becomes larger, more applications will be
created along with more VPN providers and new VPN types.
Networks are expected to converge to create an integrated VPN
Improved protocols are expected, which will also improve VPNs.
DIGITAL SIGNATURE
A digital signature is an electronic form of
a signature that can be used to authenticate the
identity of the sender of a message or the signer of a
document, and also ensure that the original content
of the message or document that has been sent is
unchanged.
THANK YOU!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy