SlideShare une entreprise Scribd logo
1  sur  46
Presented by:


Kajal P. Thakkar     3161
Alpa G. Chauhan     3091
Suja S. Nair       3116
A technology that creates a network that is
 physically public, but virtually private.

 VPNs typically require remote users of the
 network to be authenticated, and often
 secure data with encryption technologies to
 prevent disclosure of private information to
 unauthorized parties.
 Earlier   there was
1. Private   Network .

 Completely isolated network is established.
 It creates its own TCPIP internet .
 Leased lines .


 Isolated from   world .
 Costlier .
 Uses  advantages of private and global
  internet.

 Privatization   is done by leased lines .

 Cost   inefficient .
Leased lines


                                 s
                            l ine
                         ed
Le es




                      as
  lin




                 Le
   as
      ed




           Leased l
                   ines
Virtual Private Networks (VPN)
Basic Architecture
A  virtual private network (VPN) is a secure way of
 connecting to a private Local Area Network at a
 remote location, using the Internet or any
 unsecure public network to transport the network
 data packets privately, using encryption. The VPN
 uses authentication to deny access to unauthorized
 users, and encryption to prevent unauthorized
 users from reading the private network packets.
 The VPN can be used to send any kind of network
 traffic securely, including voice, video or data.
 VIRTUAL   .

 PRIVATE   .

 NETWORK       .
 TUNNELING.

 ENCRYPTION.

 ENCAPSULATION.

 AUTHENTICATION.

 FIREWALL.
TUNNELING
•    Virtual private network technology is based on the idea of
    tunneling.

•    VPN tunneling involves establishing and maintaining a logical
    network connection .


•   Tunneling is the process of placing an entire packet within
    another packet before it's transported over the Internet.

•    That outer packet protects the contents from public view and
    ensures that the packet moves within a virtual tunnel.
   On this connection, packets constructed in a
    specific VPN protocol format are encapsulated
    within some other base or carrier protocol, then
    transmitted between VPN client and server, and
    finally de-encapsulated on the receiving side.
     allows senders to encapsulate their data in IP
       packets that hide the routing and switching
       infrastructure of the Internet
     to ensure data security against unwanted viewers,
       or hackers.
1.Voluntary.

2. compulsory.
 In voluntary tunneling, the VPN client manages
  connection setup.
 The client first makes a connection to the
  carrier network provider (an ISP in the case of
  Internet VPNs).
 Then, the VPN client application creates the
  tunnel to a VPN server over this live
  connection.
 Incompulsory tunneling, the carrier network
  provider manages VPN connection setup.
 When  the client first makes an ordinary
  connection to the carrier, the carrier in turn
  immediately brokers a VPN connection
  between that client and a VPN server.
 From the client point of view, VPN
  connections are set up in just one step
  compared to the two-step procedure
 Compulsory      tunneling hides the details of
    VPN server connectivity from the VPN clients
    and effectively transfers management control
    over the tunnels from clients to the ISP.
    In return, service providers must take on the
    additional burden of installing and maintaining
    FEP devices.
 Point-to-Point Tunneling Protocol (PPTP)
 Layer Two Tunneling Protocol (L2TP)
 Internet Protocol Security (IPsec)
 It’s the most widely supported VPN method
    among Windows users and it was created by
    Microsoft in association with other technology
    companies.

    compared to other methods, PPTP is faster and
    it is also available for Linux and Mac users. .

 Voluntary   tunneling method.
   L2TP (Layer 2 Tunneling Protocol) it’s
    another tunneling protocol that supports VPNs.

    The difference between PPTP and L2TP is that
    the second one provides not only data
    confidentiality but also data integrity.

    L2TP was developed by Microsoft and Cisco as
    a combination between PPTP and L2F(Layer 2
    Forwarding).
 IPsec  is actually a collection of multiple related
    protocols.

 It  can be used as a complete VPN protocol
    solution or simply as the encryption scheme
    within L2TP or PPTP.

    IPsec exists at the network layer (Layer Three)
    of the OSI model.
 Encryption is the process of encoding data so
 that only a computer with the right decoder
 will be able to read and use it.


 TheVPN client at each end of the tunnel
 encrypt the data entering the tunnel and
 decrypt it at the other end .
There are most two common forms of
 encryption

1   . symmetric-key encryption
2   . public-key Encryption
 Authentication    process determine if the
    sender is the authorized person and if the
    data has been redirect or corrupted .

 There   are 2 levels of Authentication.

     Computer-Level Authentication
     User-level Authentication
 Firewall  provides network security and business
    continuity .
    It prevents attacks, and secures your data
    communications with multiple parallel Virtual Private
    Network (VPN) connections.
 There  are two approaches to using a firewall with a
    VPN server:
   VPN server in front of the firewall..
   VPN server behind the firewall..
 For  data encapsulation, VPN relies on either
  of the following technologies like GRE , IPSec,
  L2F,PPTP and L2TP .

 In   which IPsec and PPTP are more popular.
 Alltraffic on the secure VPN must be
  encrypted and authenticated.

 The security properties of the VPN must be
  agreed to by all parties in the VPN.

 No  one outside the VPN can affect the
  security properties of the VPN.
 Remote access   VPN
 Intranet VPN
 Extranet VPN
A  remote-access VPN allows individual
  users to establish secure connections with a
  remote computer network.
 There are two components required in a
  remote-access VPN. The first is a network
  access server(NAS).
 The other required component of remote-
  access VPNs is client software
     Intranet VPNs link corporate headquarters,
    remote offices, and branch offices over a
    shared infrastructure using dedicated
    connections.

 The    benefits of an intranet VPN are as
    follows:
      - Reduces WAN bandwidth costs
      - Connect new sites easily
       
 Extranet  VPNs link customers, suppliers,
 partners, or communities of interest to a
 corporate intranet over a shared
 infrastructure using dedicated connections. In
 this example, the VPN is often an alternative
 to fax, snail mail, or EDI. The extranet VPN
 facilitates e-commerce.
   Security -- The VPN should protect data while it's
    traveling on the public network. If intruders attempt to
    capture the data, they should be unable to read or use it.



   Reliability -- Employees and remote offices should be
    able to connect to the VPN with no trouble at any time
    (unless hours are restricted), and the VPN should
    provide the same quality of connection for each user
    even when it is handling its maximum number of
    simultaneous connections.
 Cost   Savings

 Eliminating the need for expensive long-distance leased
  lines
 Reducing the long-distance telephone charges for
  remote access.
 Transferring the support burden to the service
  providers
 Operational costs
:   Scalability

 Flexibility   of growth

 Efficiency    with broadband technology
VPNs require detailed understanding of network
security issues and careful installation / configuration
to ensure sufficient protection on a public network
like the Internet.


 The reliability and performance of an Internet-
based VPN is not under an organization's direct
control. Instead, the solution relies on an ISP and
their quality of service.
 VPN products and solutions from different
 vendors have not always been compatible
 due to issues with VPN technology standards.
 Attempting to mix and match equipment may
 cause technical problems, and using equipment
 from one provider may not give as great a cost
 savings.
Vpn

Contenu connexe

Tendances

Tendances (20)

Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage
 
VPN
VPNVPN
VPN
 
Vpn
VpnVpn
Vpn
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless security
Wireless securityWireless security
Wireless security
 

En vedette

Final ppt of project
Final ppt of projectFinal ppt of project
Final ppt of projectRuchi Gulati
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project PresentationSyed Absar
 
Presentation on project report
Presentation on project reportPresentation on project report
Presentation on project reportramesh_x
 

En vedette (6)

VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
What Is VPN
What Is VPNWhat Is VPN
What Is VPN
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Final ppt of project
Final ppt of projectFinal ppt of project
Final ppt of project
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
Presentation on project report
Presentation on project reportPresentation on project report
Presentation on project report
 

Similaire à Vpn

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn securityEric Fedewa
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPNNaim Latifi
 

Similaire à Vpn (20)

WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
V P N
V P NV P N
V P N
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn security
 
The vpn
The vpnThe vpn
The vpn
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 

Dernier

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Vpn

  • 1. Presented by: Kajal P. Thakkar 3161 Alpa G. Chauhan 3091 Suja S. Nair 3116
  • 2. A technology that creates a network that is physically public, but virtually private.  VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.
  • 3.  Earlier there was 1. Private Network .  Completely isolated network is established.  It creates its own TCPIP internet .  Leased lines .  Isolated from world .  Costlier .
  • 4.  Uses advantages of private and global internet.  Privatization is done by leased lines .  Cost inefficient .
  • 5. Leased lines s l ine ed Le es as lin Le as ed Leased l ines
  • 6. Virtual Private Networks (VPN) Basic Architecture
  • 7.
  • 8. A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.
  • 9.  VIRTUAL .  PRIVATE .  NETWORK .
  • 10.  TUNNELING.  ENCRYPTION.  ENCAPSULATION.  AUTHENTICATION.  FIREWALL.
  • 12. Virtual private network technology is based on the idea of tunneling. • VPN tunneling involves establishing and maintaining a logical network connection . • Tunneling is the process of placing an entire packet within another packet before it's transported over the Internet. • That outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.
  • 13.
  • 14. On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, and finally de-encapsulated on the receiving side.  allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet  to ensure data security against unwanted viewers, or hackers.
  • 16.  In voluntary tunneling, the VPN client manages connection setup.  The client first makes a connection to the carrier network provider (an ISP in the case of Internet VPNs).  Then, the VPN client application creates the tunnel to a VPN server over this live connection.
  • 17.  Incompulsory tunneling, the carrier network provider manages VPN connection setup.  When the client first makes an ordinary connection to the carrier, the carrier in turn immediately brokers a VPN connection between that client and a VPN server.  From the client point of view, VPN connections are set up in just one step compared to the two-step procedure
  • 18.  Compulsory tunneling hides the details of VPN server connectivity from the VPN clients and effectively transfers management control over the tunnels from clients to the ISP.  In return, service providers must take on the additional burden of installing and maintaining FEP devices.
  • 19.  Point-to-Point Tunneling Protocol (PPTP)  Layer Two Tunneling Protocol (L2TP)  Internet Protocol Security (IPsec)
  • 20.  It’s the most widely supported VPN method among Windows users and it was created by Microsoft in association with other technology companies.  compared to other methods, PPTP is faster and it is also available for Linux and Mac users. .  Voluntary tunneling method.
  • 21. L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that supports VPNs.   The difference between PPTP and L2TP is that the second one provides not only data confidentiality but also data integrity.  L2TP was developed by Microsoft and Cisco as a combination between PPTP and L2F(Layer 2 Forwarding).
  • 22.  IPsec is actually a collection of multiple related protocols.  It can be used as a complete VPN protocol solution or simply as the encryption scheme within L2TP or PPTP.  IPsec exists at the network layer (Layer Three) of the OSI model.
  • 23.
  • 24.  Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it.  TheVPN client at each end of the tunnel encrypt the data entering the tunnel and decrypt it at the other end .
  • 25. There are most two common forms of encryption 1 . symmetric-key encryption 2 . public-key Encryption
  • 26.
  • 27.  Authentication process determine if the sender is the authorized person and if the data has been redirect or corrupted .  There are 2 levels of Authentication.  Computer-Level Authentication  User-level Authentication
  • 28.  Firewall provides network security and business continuity .  It prevents attacks, and secures your data communications with multiple parallel Virtual Private Network (VPN) connections.  There are two approaches to using a firewall with a VPN server:  VPN server in front of the firewall..  VPN server behind the firewall..
  • 29.
  • 30.
  • 31.  For data encapsulation, VPN relies on either of the following technologies like GRE , IPSec, L2F,PPTP and L2TP .  In which IPsec and PPTP are more popular.
  • 32.
  • 33.  Alltraffic on the secure VPN must be encrypted and authenticated.  The security properties of the VPN must be agreed to by all parties in the VPN.  No one outside the VPN can affect the security properties of the VPN.
  • 34.  Remote access VPN  Intranet VPN  Extranet VPN
  • 35. A remote-access VPN allows individual users to establish secure connections with a remote computer network.  There are two components required in a remote-access VPN. The first is a network access server(NAS).  The other required component of remote- access VPNs is client software
  • 36.
  • 37. Intranet VPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.  The benefits of an intranet VPN are as follows:   - Reduces WAN bandwidth costs   - Connect new sites easily    
  • 38.
  • 39.  Extranet VPNs link customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure using dedicated connections. In this example, the VPN is often an alternative to fax, snail mail, or EDI. The extranet VPN facilitates e-commerce.
  • 40.
  • 41. Security -- The VPN should protect data while it's traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it.  Reliability -- Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections.
  • 42.  Cost Savings  Eliminating the need for expensive long-distance leased lines  Reducing the long-distance telephone charges for remote access.  Transferring the support burden to the service providers  Operational costs
  • 43. : Scalability  Flexibility of growth  Efficiency with broadband technology
  • 44. VPNs require detailed understanding of network security issues and careful installation / configuration to ensure sufficient protection on a public network like the Internet. The reliability and performance of an Internet- based VPN is not under an organization's direct control. Instead, the solution relies on an ISP and their quality of service.
  • 45.  VPN products and solutions from different vendors have not always been compatible due to issues with VPN technology standards. Attempting to mix and match equipment may cause technical problems, and using equipment from one provider may not give as great a cost savings.

Notes de l'éditeur

  1. A “tunnel” is simply a link between two locations through some other material. A good analogy is a tunnel that goes under a mountain. Both sides of the mountain are linked up through a direct path; in this case the “mountain” is the Internet. So essentially a tunnel is a direct shortcut through the Internet. Let’s say you have a branch office in one location using a regular Internet connection and then you want to connect to a server somewhere at your main office location. Since the data you are transferring between offices is likely sensitive, you wouldn’t want someone to be able to view that data while traveling over the Internet. That is where a VPN tunnel comes into play.
  2. In other words, employees who want to use the VPN from their computers require software on those computers that can establish and maintain a connection to the VPN Employee to Business…..
  3. A NAS might be a dedicated server, or it might be one of multiple software applications running on a shared server. It's a NAS that a user connects to from the Internet in order to use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN. To authenticate the user's credentials, the NAS uses either its own authentication process or a separate authentication server running on the network.