SlideShare une entreprise Scribd logo
1  sur  13
2015-2016
Introduction of VPN solution
By Nour frikha & Becem Adid
1
Home
Office
Nour frikha & Becem Adid 2
V
P
N
IRTUAL
RIVATE
ETWORK
What’s VPN
Technology that creates a direct link
between remote computers in
private network over a public one.
 carrier protocol
 encapsulation protocol
 passenger protocol
Nour frikha & Becem Adid 4
Nour frikha & Becem Adid
 Logical solution for remote access.
 Secure communications.
 Trylored to individuals.
 Enhancing productivity.
 Increase flexibility (anytime and anywhere
give employers to access).
 Reduce costs of communications.
 Thanks to VPN technology employers can
take their office and make flexible work
schedule.
What’s VPN
5
VPN function
Security
connect in
same private
network
access to the
information in
secure way
(remote
computers)
from any plce
in the word
Nour frikha & Becem Adid 6
VPN allows:
Media files
Nour frikha & Becem Adid 7
• Private traffic and safe
from hacker and sniffer
and other danger in
internet (virus or
pirates).
• Crypted and secure
communication
become anonymous
online.
Nour frikha & Becem Adid 8
VPN
Because of geolocation block
connect ( video , news , search )
non available data
Nour frikha & Becem Adid 9
online contact for
government
censorship : let
the information
be available for
users and give
the key to more
freedom
Nour frikha & Becem Adid 10
VPN uses :
PPTP
PPTP (Point-to-Point
Tunneling Protocol) tunnel
protocol point-to-point is a
PPP encapsulation over IP
developed by Microsoft.
L2TP
Layer 2 Tunnelling Protocol is a
tunnelling protocol used to support
virtual private networks (VPNs) It
does not provide any encryption or
confidentiality by itself.
IPSEC
Internet Protocol Security (IPsec) allows
two or more hosts to communicate in a
secure manner by authenticating and
encrypting each IP packet of a
communication session
SSL(TLS)
Secure Sockets Layer (SSL) VPN is an
emerging technology that provides
remote-access VPN capability and allows
users from any Internet-enabled location
to launch a web browser to establish
remote-access VPN connections
VPNto provide security of data transfer from danger of internet
Nour frikha & Becem Adid 11
Demo
Nour frikha & Becem Adid 12
Thank you for attention
Nour frikha & Becem Adid 13

Contenu connexe

Tendances

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 

Tendances (20)

Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn security
Vpn security Vpn security
Vpn security
 
Vpn
VpnVpn
Vpn
 
VPN
VPNVPN
VPN
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 

En vedette

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
Wajahat Rajab
 

En vedette (12)

VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
What is vpn and how it can help you
What is vpn and how it can help youWhat is vpn and how it can help you
What is vpn and how it can help you
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Surviving the Job Famine
Surviving the Job FamineSurviving the Job Famine
Surviving the Job Famine
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
ITIL Service Desk
 
ITIL Service Desk Tools
ITIL Service Desk ToolsITIL Service Desk Tools
ITIL Service Desk Tools
 

Similaire à Vpn presnt

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 

Similaire à Vpn presnt (20)

Vpn
VpnVpn
Vpn
 
Vpn
Vpn Vpn
Vpn
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
V P N
V P NV P N
V P N
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Vpn
VpnVpn
Vpn
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
Blug talk
Blug talkBlug talk
Blug talk
 
Stay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfStay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdf
 
All About VPN
All About VPNAll About VPN
All About VPN
 

Plus de Frikha Nour (9)

Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation
 
Refarming 4 g
Refarming 4 gRefarming 4 g
Refarming 4 g
 
Open stack presentation
Open stack presentationOpen stack presentation
Open stack presentation
 
Ngn presentation
Ngn presentationNgn presentation
Ngn presentation
 
Best price
Best priceBest price
Best price
 
Lateral safe system
Lateral safe systemLateral safe system
Lateral safe system
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 
Vpn presnt
Vpn presntVpn presnt
Vpn presnt
 
5 g network & technology
5 g network & technology5 g network & technology
5 g network & technology
 

Dernier

Dernier (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Vpn presnt

  • 1. 2015-2016 Introduction of VPN solution By Nour frikha & Becem Adid 1
  • 4. What’s VPN Technology that creates a direct link between remote computers in private network over a public one.  carrier protocol  encapsulation protocol  passenger protocol Nour frikha & Becem Adid 4
  • 5. Nour frikha & Becem Adid  Logical solution for remote access.  Secure communications.  Trylored to individuals.  Enhancing productivity.  Increase flexibility (anytime and anywhere give employers to access).  Reduce costs of communications.  Thanks to VPN technology employers can take their office and make flexible work schedule. What’s VPN 5
  • 6. VPN function Security connect in same private network access to the information in secure way (remote computers) from any plce in the word Nour frikha & Becem Adid 6
  • 7. VPN allows: Media files Nour frikha & Becem Adid 7
  • 8. • Private traffic and safe from hacker and sniffer and other danger in internet (virus or pirates). • Crypted and secure communication become anonymous online. Nour frikha & Becem Adid 8
  • 9. VPN Because of geolocation block connect ( video , news , search ) non available data Nour frikha & Becem Adid 9
  • 10. online contact for government censorship : let the information be available for users and give the key to more freedom Nour frikha & Becem Adid 10
  • 11. VPN uses : PPTP PPTP (Point-to-Point Tunneling Protocol) tunnel protocol point-to-point is a PPP encapsulation over IP developed by Microsoft. L2TP Layer 2 Tunnelling Protocol is a tunnelling protocol used to support virtual private networks (VPNs) It does not provide any encryption or confidentiality by itself. IPSEC Internet Protocol Security (IPsec) allows two or more hosts to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session SSL(TLS) Secure Sockets Layer (SSL) VPN is an emerging technology that provides remote-access VPN capability and allows users from any Internet-enabled location to launch a web browser to establish remote-access VPN connections VPNto provide security of data transfer from danger of internet Nour frikha & Becem Adid 11
  • 12. Demo Nour frikha & Becem Adid 12
  • 13. Thank you for attention Nour frikha & Becem Adid 13

Notes de l'éditeur

  1. private secure method where we can share bussiness communication but also have limations bcs this can be expensive and often when the distance increase and employers were required to go the office to access to resources