0% found this document useful (0 votes)
68 views17 pages

Saeed Ahmad and Arshad Ali: Topic: Virtual Private Network (VPN)

This document discusses virtual private networks (VPNs). It begins by explaining how the internet works as a cloud that connects everyone, but data transfer is not secure. It then describes how organizations used to rely on expensive leased lines for communication between branches before VPNs. VPNs allow organizations to connect to the internet for data transfer through secure "tunnels" that encrypt data flow, making it look like a private network. The document defines VPNs and lists their benefits of low cost, security, and scalability. It describes the main types of VPNs as site-to-site for connecting multiple locations and remote access for single users. It also lists the three main protocols used in VPNs and discusses tunneling. Finally, it

Uploaded by

Ihsanullah Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views17 pages

Saeed Ahmad and Arshad Ali: Topic: Virtual Private Network (VPN)

This document discusses virtual private networks (VPNs). It begins by explaining how the internet works as a cloud that connects everyone, but data transfer is not secure. It then describes how organizations used to rely on expensive leased lines for communication between branches before VPNs. VPNs allow organizations to connect to the internet for data transfer through secure "tunnels" that encrypt data flow, making it look like a private network. The document defines VPNs and lists their benefits of low cost, security, and scalability. It describes the main types of VPNs as site-to-site for connecting multiple locations and remote access for single users. It also lists the three main protocols used in VPNs and discusses tunneling. Finally, it

Uploaded by

Ihsanullah Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Saeed Ahmad

and
Arshad Ali

Topic: Virtual Private Network


(VPN)

1
Internet

 Internet is a cloud
 Every body connected
 Data transferring

2
Organization (No Internet)

 Communication need
 Leased line required
 High cost
 No. of branches increases cost increases
 High cost problems
 More than 100,00 for 1 or 2 leased line
 Distance increases cost increases

3
Organization (Internet)

 Connected to internet
 Data transfer through internet
 Not secure
 Tunneling over internet(L2TP)
 Tunnel a security shield
 Virtual but looking physical
 Data flow Encrypted

4
Why VPN needed?

 Low cost
 Security
 Scalability

5
VPN Definition?

 The flow of data over a public network in such


a way that it looks like a private network with
no or less security problems.

6
Types of VPN……
1.Site to site VPN
2.Remote access
 Site to site VPN: VPN capable devices i.e.
Router , Firewall,
 Communication are looking like within the
same building as they are faraway
 The number of site varies from 1 to many
 The number of computers also varies on each
site

7
Types of VPN…..

2.Remote access
 A single user is connected directly
 Cisco easy vpn s/w required for tunnel making
 Provides work from home facility
 Tunnel is made only on single pc not on many
 If no. of pc’s increases then problem of easy
vpn installation arise
 Then using SSL(secure socket layer) as a
encryption protocol
8
Types of VPN

 2factors authentication then tunnel formed


 Also called web vpn

9
Any Question . . . . . .

Plz ask from Engr. Ahmad


Hassan Saib

10
Three Protocols used in VPN
 PPTP -- Point-to-Point Tunneling Protocol
Encapsulate and encrypt the data to be sent over a corporate or
public IP network
 layer 2 Tunneling Protocol
L2TP used for tunneling
 IPsec -- Internet Protocol Security
used to encrypt the data.

11
Tunneling

A virtual point-to-point connection


made through a public network. It transports
encapsulated datagrams.

12
Types of Implementations
What does “implementation” mean in VPNs?

3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business

13
Advantages
and
Disadvantages

14
Advantages:
 Cost saving
 Scalability:
 flexibility to growth
 Efficiency with broadband technology
Disadvantages:
 Time consuming setup.
 VPNs need to accommodate protocols other than IP and
existing internal network technology
 Immatue standard
Any Question…..

Google kare g……….

16
THANK YOU….

17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy