SlideShare une entreprise Scribd logo
1  sur  14
VIRTUAL PRIVATEVIRTUAL PRIVATE
NETWORKS (VPN)NETWORKS (VPN)
BY:BY:
JAYDEEP GHAGHADAJAYDEEP GHAGHADA
146020307515146020307515
Traditional ConnectivityTraditional Connectivity
[From Gartner Consulting][From Gartner Consulting]
What is VPN?What is VPN?
Virtual Private Network is a type of privateVirtual Private Network is a type of private
network that uses public telecommunication,network that uses public telecommunication,
such as the Internet, instead of leased lines tosuch as the Internet, instead of leased lines to
communicate.communicate.
Became popular as more employees worked inBecame popular as more employees worked in
remote locations.remote locations.
How are VPN better than PrivateHow are VPN better than Private
Networks.Networks.
Employees can access the network (Intranet)Employees can access the network (Intranet)
from remote locations.from remote locations.
Secured networks.Secured networks.
The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs
Saves cost tremendously from reduction ofSaves cost tremendously from reduction of
equipment and maintenance costs.equipment and maintenance costs.
Brief Overview of How it WorksBrief Overview of How it Works
Two connections – one is made to theTwo connections – one is made to the
Internet and the second is made to theInternet and the second is made to the
VPN.VPN.
Datagrams – contains data, destinationDatagrams – contains data, destination
and source information.and source information.
Firewalls – VPNs allow authorized usersFirewalls – VPNs allow authorized users
to pass through the firewalls.to pass through the firewalls.
Protocols – protocols create the VPNProtocols – protocols create the VPN
tunnels.tunnels.
Four Critical FunctionsFour Critical Functions
AuthenticationAuthentication – validates that the data was– validates that the data was
sent from the sender.sent from the sender.
Access controlAccess control – limiting unauthorized users– limiting unauthorized users
from accessing the network.from accessing the network.
ConfidentialityConfidentiality – preventing the data to be– preventing the data to be
read or copied as the data is beingread or copied as the data is being
transported.transported.
Data IntegrityData Integrity – ensuring that the data has– ensuring that the data has
not been alterednot been altered
EncryptionEncryption
Encryption -- is a method of “scrambling”Encryption -- is a method of “scrambling”
data before transmitting it onto thedata before transmitting it onto the
Internet.Internet.
Public Key Encryption TechniquePublic Key Encryption Technique
Digital signature – for authenticationDigital signature – for authentication
TunnelingTunneling
A virtual point-to-point connectionA virtual point-to-point connection
made through a public network. It transportsmade through a public network. It transports
encapsulated datagrams.encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Original Datagram
Data Encapsulation [From Comer]
Two types of end points:
 Remote Access
 Site-to-Site
Three Protocols used in VPNThree Protocols used in VPN
PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security
Types of VPNTypes of VPN
3 Types3 Types
Intranet – Within an organizationIntranet – Within an organization
Extranet – Outside an organizationExtranet – Outside an organization
Remote Access – Employee to BusinessRemote Access – Employee to Business
Virtual Private Networks (VPN)
Basic Architecture
 Eliminating the need for expensive long-distanceEliminating the need for expensive long-distance
leased linesleased lines
 Reducing the long-distance telephone chargesReducing the long-distance telephone charges
for remote access.for remote access.
 Transferring the support burden to the serviceTransferring the support burden to the service
providersproviders
 Operational costsOperational costs
Advantages:Advantages:
VPNs require an in-depth understanding ofVPNs require an in-depth understanding of
public network security issues and properpublic network security issues and proper
deployment of precautionsdeployment of precautions
Availability and performance depends on factorsAvailability and performance depends on factors
largely outside of their controllargely outside of their control
Immature standardsImmature standards
VPNs need to accommodate protocols otherVPNs need to accommodate protocols other
than IP and existing internal network technologythan IP and existing internal network technology
DisadvantagesDisadvantages
THANK YOUTHANK YOU

Contenu connexe

Tendances

Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSECAPNIC
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Introduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureIntroduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureAnkita Mahajan
 

Tendances (20)

Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
Vpn
VpnVpn
Vpn
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
IP Security
IP SecurityIP Security
IP Security
 
Introduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureIntroduction to Data Center Network Architecture
Introduction to Data Center Network Architecture
 
Vpn
VpnVpn
Vpn
 

Similaire à VPN (20)

Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ism
IsmIsm
Ism
 
Vpn
Vpn Vpn
Vpn
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

VPN

  • 1. VIRTUAL PRIVATEVIRTUAL PRIVATE NETWORKS (VPN)NETWORKS (VPN) BY:BY: JAYDEEP GHAGHADAJAYDEEP GHAGHADA 146020307515146020307515
  • 2. Traditional ConnectivityTraditional Connectivity [From Gartner Consulting][From Gartner Consulting]
  • 3. What is VPN?What is VPN? Virtual Private Network is a type of privateVirtual Private Network is a type of private network that uses public telecommunication,network that uses public telecommunication, such as the Internet, instead of leased lines tosuch as the Internet, instead of leased lines to communicate.communicate. Became popular as more employees worked inBecame popular as more employees worked in remote locations.remote locations.
  • 4. How are VPN better than PrivateHow are VPN better than Private Networks.Networks. Employees can access the network (Intranet)Employees can access the network (Intranet) from remote locations.from remote locations. Secured networks.Secured networks. The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs Saves cost tremendously from reduction ofSaves cost tremendously from reduction of equipment and maintenance costs.equipment and maintenance costs.
  • 5. Brief Overview of How it WorksBrief Overview of How it Works Two connections – one is made to theTwo connections – one is made to the Internet and the second is made to theInternet and the second is made to the VPN.VPN. Datagrams – contains data, destinationDatagrams – contains data, destination and source information.and source information. Firewalls – VPNs allow authorized usersFirewalls – VPNs allow authorized users to pass through the firewalls.to pass through the firewalls. Protocols – protocols create the VPNProtocols – protocols create the VPN tunnels.tunnels.
  • 6. Four Critical FunctionsFour Critical Functions AuthenticationAuthentication – validates that the data was– validates that the data was sent from the sender.sent from the sender. Access controlAccess control – limiting unauthorized users– limiting unauthorized users from accessing the network.from accessing the network. ConfidentialityConfidentiality – preventing the data to be– preventing the data to be read or copied as the data is beingread or copied as the data is being transported.transported. Data IntegrityData Integrity – ensuring that the data has– ensuring that the data has not been alterednot been altered
  • 7. EncryptionEncryption Encryption -- is a method of “scrambling”Encryption -- is a method of “scrambling” data before transmitting it onto thedata before transmitting it onto the Internet.Internet. Public Key Encryption TechniquePublic Key Encryption Technique Digital signature – for authenticationDigital signature – for authentication
  • 8. TunnelingTunneling A virtual point-to-point connectionA virtual point-to-point connection made through a public network. It transportsmade through a public network. It transports encapsulated datagrams.encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] Two types of end points:  Remote Access  Site-to-Site
  • 9. Three Protocols used in VPNThree Protocols used in VPN PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security
  • 10. Types of VPNTypes of VPN 3 Types3 Types Intranet – Within an organizationIntranet – Within an organization Extranet – Outside an organizationExtranet – Outside an organization Remote Access – Employee to BusinessRemote Access – Employee to Business
  • 11. Virtual Private Networks (VPN) Basic Architecture
  • 12.  Eliminating the need for expensive long-distanceEliminating the need for expensive long-distance leased linesleased lines  Reducing the long-distance telephone chargesReducing the long-distance telephone charges for remote access.for remote access.  Transferring the support burden to the serviceTransferring the support burden to the service providersproviders  Operational costsOperational costs Advantages:Advantages:
  • 13. VPNs require an in-depth understanding ofVPNs require an in-depth understanding of public network security issues and properpublic network security issues and proper deployment of precautionsdeployment of precautions Availability and performance depends on factorsAvailability and performance depends on factors largely outside of their controllargely outside of their control Immature standardsImmature standards VPNs need to accommodate protocols otherVPNs need to accommodate protocols other than IP and existing internal network technologythan IP and existing internal network technology DisadvantagesDisadvantages