SlideShare une entreprise Scribd logo
1  sur  33
VIRTUAL
PRIVATE
NETWORK




PREPARED BY:
Jigar B Navadiya
(D11CE144)
VIRTUAL PRIVATE NETWORK
 Definition
           and introductory notes
     VPN is the network which uses open
 distributed infrastructure of the internet
 to transmit data between corporate sites.
NEED FOR DEVELOPING VPN
 Remote  employees interested to access
  database of corporations.
 Corporate sites developing new relations.
 Increasing growth of the corporation.
VPN RESOLVES THE
PROBLEM
 Itprovides flexibility and scalability
 Cost advantage.
 Makes free from maintenance and training.
WORKING OF VPN
 STEP1…

 STEP2…

 STEP3…
 STEP4…
WORKING-STEP1 (cont…)
 The remote user dials into their local ISP and logs
 into the ISP’s network as usual.




                                            BACK
WORKING-STEP2 (cont…)
 When  connectivity to the
 corporate network is
 desired, the user
 initiates a tunnel request
 to the destination
 Security server




                      BACK
WORKING-STEP3 (cont…)
   The user then sends
    data    through    the
    tunnel which encrypted
    by the VPN software
    before being sent over
    the ISP connection




                     BACK
WORKING-STEP4 (cont…)
 Thedestination Security server receives
 the encrypted data and decrypts.
TYPES OF VPN
 VLL-Virtual   leased lines.
 VPRN-virtual   private routed network.
 VPDN-virtual   private dial-up network.
 VPLS-virtual   private LAN segments.
 Intranet   VPN.
 Extranet   VPN.
 Remote   access VPN.
Virtual Private Network


 VIRTUAL LEASED LINES
 Point to point link
  between two CPE
 IP tunnel between
  2 ISP edge
  routers.
 Frames are relayed
  between IP tunnels.
Virtual Private Network

   VIRTUAL PRIVATE ROUTED
   NETWORK
 Emulation of multisite
  WAN using internet.
 Packet forwarding at
  network layer.
 VPRN specific
  forwarding table at
  ISP routers that
  forwards the traffic.
VIRTUAL PRIVATE DIAL-UP
NETWORK
 On demand tunnel between remote user and
  corporate sites.
 There are possible 2 tunnels.

1… compulsory tunnel.
2… voluntary tunnel.
Virtual Private Network


COMPULSORY TUNNEL
   In this scenario L2TP
    Access Contractor (LAC)
    acting as a dial or
    network access server
    extends a PPP session
    across a backbone using
    L2TP to a remote L2TP
    Network Server (LNS).
    The       operation     of
    initiating the PPP session
    to the LAC is transparent
    to the user.
                 BACK
Virtual Private Network


VOLUNTARY TUNNEL
                Voluntary tunnel refers
                to the case where an
                individual host connects
                to a remote site using a
                tunnel originating on the
                host, with no involvement
                from intermediate
                network nodes. Tunnel
                mechanism chosen can be
                IPSec or L2TP.
VIRTUAL PRIVATE LAN
SEGMENTS
                 A Virtual Private
                  LAN Segment
                  (VPLS) is the
                  emulation of a LAN
                  segment using
                  internet facilities.
INTRANET VPN
                The branch office
                scenario securely
                connects two trusted
                intranets within the
                organization.
                Routers or firewalls
                acting as gateways for
                the office with vpn
                capabilities can be
                used to protect the
                corporate traffic.
EXTRANET VPN
 Inthis scenario multiple supplier intranets that need
 to access a common corporate network over the
 Internet. Each supplier is allowed access to only a
 limited set of destinations within the corporate
 network.
REMOTE ACCESS VPN
A remote user wants to be able to communicate securely
 and cost-effectively to his corporate intranet. This can
 be done by use of an VPN IPSec enabled remote client
 and firewall (or gateway).
VPN PROTOCOLS
 1. PPTP (Point-to-point tunneling
  protocol)
 2.   IPsec (IP security).
 3.   L2TP (layer2 transmission protocol).
LAYER2 TRANSMISSION
PROTOCOL


 What is actually the layer two transmission
 protocol ???



 NEXT
POINT TO POINT
TUNNELING PROTOCOL
 Introduction   to PPTP.
 How   actually PPTP works ???
 Security   provided by PPTP.
 Advantages   of PPTP.
 Disadvantages   of PPTP.



 BACK
INTERNET PROTOCOL
SECURITY
 Introduction   to IP security.
 Features   of IP security.
 Types   of IPsec protocols.
 Types   of modes used in IPsec.



 BACK
SECURITY OF VPN

 Hardware   solution
 Remote   access control.
CERTAIN H/W AND S/W
SPECIFICATIONS…
  Desktop software client for each remote
     user
 Dedicated hardware such as a VPN
  Concentrator or Secure
 PIX Firewall
 Dedicated VPN server for dial-up services
 NAS (Network Access Server) used by
  service provider for
 remote user VPN access
Virtual Private Network


VPN CONCENTRATOR
 Itincorporates the
 most advanced
 encryption and
 authentication
 techniques for
 Remote access
 VPN.
Virtual Private Network


VPN-OPTIMIZED ROUTER
 VPN-optimized
 routers provide
 scalability, routing,
 security and quality
 of service.
Virtual Private Network


PIX FIREWALL
 Firewallcombines
 dynamic network
 address
 translation, proxy
 server, packet
 filtration, firewall
 and VPN
 capabilities in a
 single piece of
 hardware.
Virtual Private Network


VPN/VOIP Application
ADVANTAGES OF VPN


 Cost saving.
 Reduces the long distance charges of
  electronic transactions.
 Concrete security.
DISADVANTAGES OF VPN
VPNs require an in-depth understanding of public network security
 issues and taking proper precautions in VPN deployment.


 The availability and performance of an organization's wide-area
 VPN (over the Internet in particular) depends on factors largely
 outside of their control.


 VPN technologies from different vendors may not work well
 together due to immature standards.
CONCLUSION

 From this we can conclude that VPN
 provides a very safe , secure and cost-
 effective communication infrastructure.
Virtual Private Network




THANKING YOU !!!

Contenu connexe

Tendances

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private NetworkShubhayu Roy
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 

Tendances (20)

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Vpn
VpnVpn
Vpn
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Vpn
VpnVpn
Vpn
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

En vedette

Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Joseph Brunner
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8VISHNU N
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9VISHNU N
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection pptDasarathi Dash
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 

En vedette (8)

Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similaire à Vpn_NJ ppt

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private NetworksDivam Goyal
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaDarshana Viduranga
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 

Similaire à Vpn_NJ ppt (20)

V P N
V P NV P N
V P N
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
4 vpn s
4 vpn s4 vpn s
4 vpn s
 
Vpn
Vpn Vpn
Vpn
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Vpn_NJ ppt

  • 2. VIRTUAL PRIVATE NETWORK  Definition and introductory notes VPN is the network which uses open distributed infrastructure of the internet to transmit data between corporate sites.
  • 3. NEED FOR DEVELOPING VPN  Remote employees interested to access database of corporations.  Corporate sites developing new relations.  Increasing growth of the corporation.
  • 4. VPN RESOLVES THE PROBLEM  Itprovides flexibility and scalability  Cost advantage.  Makes free from maintenance and training.
  • 5. WORKING OF VPN  STEP1…  STEP2…  STEP3…  STEP4…
  • 6. WORKING-STEP1 (cont…)  The remote user dials into their local ISP and logs into the ISP’s network as usual. BACK
  • 7. WORKING-STEP2 (cont…)  When connectivity to the corporate network is desired, the user initiates a tunnel request to the destination Security server BACK
  • 8. WORKING-STEP3 (cont…)  The user then sends data through the tunnel which encrypted by the VPN software before being sent over the ISP connection BACK
  • 9. WORKING-STEP4 (cont…)  Thedestination Security server receives the encrypted data and decrypts.
  • 10. TYPES OF VPN  VLL-Virtual leased lines.  VPRN-virtual private routed network.  VPDN-virtual private dial-up network.  VPLS-virtual private LAN segments.  Intranet VPN.  Extranet VPN.  Remote access VPN.
  • 11. Virtual Private Network VIRTUAL LEASED LINES  Point to point link between two CPE  IP tunnel between 2 ISP edge routers.  Frames are relayed between IP tunnels.
  • 12. Virtual Private Network VIRTUAL PRIVATE ROUTED NETWORK  Emulation of multisite WAN using internet.  Packet forwarding at network layer.  VPRN specific forwarding table at ISP routers that forwards the traffic.
  • 13. VIRTUAL PRIVATE DIAL-UP NETWORK  On demand tunnel between remote user and corporate sites.  There are possible 2 tunnels. 1… compulsory tunnel. 2… voluntary tunnel.
  • 14. Virtual Private Network COMPULSORY TUNNEL  In this scenario L2TP Access Contractor (LAC) acting as a dial or network access server extends a PPP session across a backbone using L2TP to a remote L2TP Network Server (LNS). The operation of initiating the PPP session to the LAC is transparent to the user. BACK
  • 15. Virtual Private Network VOLUNTARY TUNNEL  Voluntary tunnel refers to the case where an individual host connects to a remote site using a tunnel originating on the host, with no involvement from intermediate network nodes. Tunnel mechanism chosen can be IPSec or L2TP.
  • 16. VIRTUAL PRIVATE LAN SEGMENTS A Virtual Private LAN Segment (VPLS) is the emulation of a LAN segment using internet facilities.
  • 17. INTRANET VPN  The branch office scenario securely connects two trusted intranets within the organization.  Routers or firewalls acting as gateways for the office with vpn capabilities can be used to protect the corporate traffic.
  • 18. EXTRANET VPN  Inthis scenario multiple supplier intranets that need to access a common corporate network over the Internet. Each supplier is allowed access to only a limited set of destinations within the corporate network.
  • 19. REMOTE ACCESS VPN A remote user wants to be able to communicate securely and cost-effectively to his corporate intranet. This can be done by use of an VPN IPSec enabled remote client and firewall (or gateway).
  • 20. VPN PROTOCOLS  1. PPTP (Point-to-point tunneling protocol)  2. IPsec (IP security).  3. L2TP (layer2 transmission protocol).
  • 21. LAYER2 TRANSMISSION PROTOCOL  What is actually the layer two transmission protocol ??? NEXT
  • 22. POINT TO POINT TUNNELING PROTOCOL  Introduction to PPTP.  How actually PPTP works ???  Security provided by PPTP.  Advantages of PPTP.  Disadvantages of PPTP. BACK
  • 23. INTERNET PROTOCOL SECURITY  Introduction to IP security.  Features of IP security.  Types of IPsec protocols.  Types of modes used in IPsec. BACK
  • 24. SECURITY OF VPN  Hardware solution  Remote access control.
  • 25. CERTAIN H/W AND S/W SPECIFICATIONS…  Desktop software client for each remote user  Dedicated hardware such as a VPN Concentrator or Secure  PIX Firewall  Dedicated VPN server for dial-up services  NAS (Network Access Server) used by service provider for  remote user VPN access
  • 26. Virtual Private Network VPN CONCENTRATOR  Itincorporates the most advanced encryption and authentication techniques for Remote access VPN.
  • 27. Virtual Private Network VPN-OPTIMIZED ROUTER  VPN-optimized routers provide scalability, routing, security and quality of service.
  • 28. Virtual Private Network PIX FIREWALL  Firewallcombines dynamic network address translation, proxy server, packet filtration, firewall and VPN capabilities in a single piece of hardware.
  • 30. ADVANTAGES OF VPN  Cost saving.  Reduces the long distance charges of electronic transactions.  Concrete security.
  • 31. DISADVANTAGES OF VPN VPNs require an in-depth understanding of public network security issues and taking proper precautions in VPN deployment. The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. VPN technologies from different vendors may not work well together due to immature standards.
  • 32. CONCLUSION  From this we can conclude that VPN provides a very safe , secure and cost- effective communication infrastructure.