SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
VIRTUAL PRIVATE NETWORK




       How It is Done?




           Sovello Hildebrand Mgani
        IT Consultant - FUGIT Consult
                   Tanzania
         sovellohpmgani@gmail.com
How it is done!

   Site-to-site VPN
   Remote Access VPN
   Requirements
       Internet connection options
Site-to-Site VPN

   Data is encrypted from one VPN gateway to the
    other. This enables resource sharing. e.g.
    documents and other types of data over the
    VPN link.




                                          Photo: Courtesy of Sovello Hildebrand Mgani
Remote Access VPN

   Makes possible a secure connection from an
    individual computer to a VPN gateway.
   Provided there is an internet connection: users
    will be able to access everything from their
    office.




                                             Photo: Courtesy of Sovello Hildebrand Mgani
Requirements

   All offices connected to the Internet
   A Server with a Public IP address.
       Justification: a server so that it can be running 24/7, a
        public IP address so that this server can be reachable
        from distant access points not in the same network.
   VPN Client: the software that allows the
    communication to take place.
       Consider proprietary vs. free and open source

    Routers, firewalls, switches, etc.
       An exhaustive list to be found in the network installation
        plan document
Requirements: Internet Connection

   The options to connect to the internet for this
    particular case is
       TTCL Broadband
       Fibre Optic
       Corporate Private ISPs including
             University Computing Center
             Africa Online
             iWAY Africa
             Benson Online (BOL)
             Raha
             Net Solutions etc.

Contenu connexe

Tendances

AP Automation Benefits - Before and After
AP Automation Benefits - Before and AfterAP Automation Benefits - Before and After
AP Automation Benefits - Before and AfterRalf Leitner
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Paris Salesforce Developer Group
 
Salesforce Developer Console ppt
Salesforce Developer Console  pptSalesforce Developer Console  ppt
Salesforce Developer Console pptKuhinoor Alom
 
Data Center Architecture Trends
Data Center Architecture TrendsData Center Architecture Trends
Data Center Architecture TrendsPanduit
 
Cloud service management
Cloud service managementCloud service management
Cloud service managementgaurav jain
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)WSO2
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_designTushar Rajput
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed ComputingAbhishek Jaisingh
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communicationAnkit Anand
 
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Cloud Computing Wire
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelSalesforce Developers
 
A project on taxi
A  project on taxi A  project on taxi
A project on taxi 549manish
 
A PRESENTATION ON STRUTS & HIBERNATE
A PRESENTATION ON STRUTS & HIBERNATEA PRESENTATION ON STRUTS & HIBERNATE
A PRESENTATION ON STRUTS & HIBERNATETushar Choudhary
 
24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMS24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMSkoolkampus
 

Tendances (20)

AP Automation Benefits - Before and After
AP Automation Benefits - Before and AfterAP Automation Benefits - Before and After
AP Automation Benefits - Before and After
 
DATA CENTER
DATA CENTER DATA CENTER
DATA CENTER
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
Middleware
MiddlewareMiddleware
Middleware
 
SOA Unit I
SOA Unit ISOA Unit I
SOA Unit I
 
Salesforce Developer Console ppt
Salesforce Developer Console  pptSalesforce Developer Console  ppt
Salesforce Developer Console ppt
 
Data Center Architecture Trends
Data Center Architecture TrendsData Center Architecture Trends
Data Center Architecture Trends
 
Data center
Data centerData center
Data center
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 
Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA)
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model
 
A project on taxi
A  project on taxi A  project on taxi
A project on taxi
 
A PRESENTATION ON STRUTS & HIBERNATE
A PRESENTATION ON STRUTS & HIBERNATEA PRESENTATION ON STRUTS & HIBERNATE
A PRESENTATION ON STRUTS & HIBERNATE
 
24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMS24. Advanced Transaction Processing in DBMS
24. Advanced Transaction Processing in DBMS
 
Data Center Monitoring
Data Center MonitoringData Center Monitoring
Data Center Monitoring
 

Similaire à Implementation of a Virtual Private Network - VPN

Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsSovello Hildebrand
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfAceAtigaVallo
 
Virtual Private Networks Commonly Called As Vpn
Virtual Private Networks Commonly Called As VpnVirtual Private Networks Commonly Called As Vpn
Virtual Private Networks Commonly Called As VpnMichele Lata
 
Virtual Private Network ( Vpn ) Connections Essay
Virtual Private Network ( Vpn ) Connections EssayVirtual Private Network ( Vpn ) Connections Essay
Virtual Private Network ( Vpn ) Connections EssayLaura Benitez
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
A Report On Virtual Private Network Essay
A Report On Virtual Private Network EssayA Report On Virtual Private Network Essay
A Report On Virtual Private Network EssayJessica Reed
 
A Survey On Virtual Private Network Security And Its...
A Survey On Virtual Private Network Security And Its...A Survey On Virtual Private Network Security And Its...
A Survey On Virtual Private Network Security And Its...Renee Wardowski
 

Similaire à Implementation of a Virtual Private Network - VPN (20)

Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Networks Commonly Called As Vpn
Virtual Private Networks Commonly Called As VpnVirtual Private Networks Commonly Called As Vpn
Virtual Private Networks Commonly Called As Vpn
 
Virtual Private Network ( Vpn ) Connections Essay
Virtual Private Network ( Vpn ) Connections EssayVirtual Private Network ( Vpn ) Connections Essay
Virtual Private Network ( Vpn ) Connections Essay
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
A Report On Virtual Private Network Essay
A Report On Virtual Private Network EssayA Report On Virtual Private Network Essay
A Report On Virtual Private Network Essay
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Private LTE.pdf
Private LTE.pdfPrivate LTE.pdf
Private LTE.pdf
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vpn
VpnVpn
Vpn
 
A Survey On Virtual Private Network Security And Its...
A Survey On Virtual Private Network Security And Its...A Survey On Virtual Private Network Security And Its...
A Survey On Virtual Private Network Security And Its...
 
VPN
VPN VPN
VPN
 

Dernier

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 

Dernier (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 

Implementation of a Virtual Private Network - VPN

  • 1. VIRTUAL PRIVATE NETWORK How It is Done? Sovello Hildebrand Mgani IT Consultant - FUGIT Consult Tanzania sovellohpmgani@gmail.com
  • 2. How it is done!  Site-to-site VPN  Remote Access VPN  Requirements  Internet connection options
  • 3. Site-to-Site VPN  Data is encrypted from one VPN gateway to the other. This enables resource sharing. e.g. documents and other types of data over the VPN link. Photo: Courtesy of Sovello Hildebrand Mgani
  • 4. Remote Access VPN  Makes possible a secure connection from an individual computer to a VPN gateway.  Provided there is an internet connection: users will be able to access everything from their office. Photo: Courtesy of Sovello Hildebrand Mgani
  • 5. Requirements  All offices connected to the Internet  A Server with a Public IP address.  Justification: a server so that it can be running 24/7, a public IP address so that this server can be reachable from distant access points not in the same network.  VPN Client: the software that allows the communication to take place.  Consider proprietary vs. free and open source  Routers, firewalls, switches, etc.  An exhaustive list to be found in the network installation plan document
  • 6. Requirements: Internet Connection  The options to connect to the internet for this particular case is  TTCL Broadband  Fibre Optic  Corporate Private ISPs including  University Computing Center  Africa Online  iWAY Africa  Benson Online (BOL)  Raha  Net Solutions etc.