SlideShare a Scribd company logo
1 of 10
VIRTUAL PRIVATE NETWORK
is a private and secure network connection
between systems that uses the data
communication capability of an unsecured and
public network.
Uses leased circuits from a service provider and conducts packet switching over
these leased circuits.
use security protocols and encrypt traffic transmitted across unsecured
public network like the network.
combines the two, providing encrypted transmissions(like secure VPN) over some
or all of a trusted VPN network.
 Encapsulation of incoming and outgoing data,
wherein the native protocol of the client is
embedded
 Encryption of incoming and outgoing data to
keep the data contents private
 Authentication of the remote computer and
perhaps, the remote user as well.
TRANSPORT MODE VPN
The data within an IP packet is encrypted but the header information
is not.
This allows the user to establish a secure link directly with the
remote host encrypting only the data contents of the packet.
The downside to this implementation is that packet eavesdroppers
can still identify the destination system.
Once an attacker knows the destination, he or she maybe able to
compromise one of the end nodes and acquire the packet
information from it.
On the other hand, transport mode eliminates the need for special
servers and tunneling software and allows the end users to transmit
traffic anywhere.
i)
Two end users can communicate directly,
encrypting and decrypting their
communications as needed.
Each machine acts as the end node VPN
server and client.
ii)
This allows the teleworker’s system to work as if it were
part of the local area network.
Ex: the VPN server as an intermediate node, encrypting
traffic from the secure intranet and transmitting it to the
remote client and decrypting traffic from the remote client
and transmitting it to its final destination.
Tunel Mode VPN
• The organization establishes two perimeter
tunnel servers that encrypt all traffic that will
traverse an unsecured network.
• The entire client packet is encrypted and
added as the data portion of a packet
addressed from one tunneling server and to
another.
• The receiving server decrypts, the packet and
sends it to the final address.
• The primary benefit to this model is that an
intercepted packet reveals nothing about the
true destination system.
• Ex: tunnel mode VPN is provided with
Microsoft’s Internet Security and Acceleration
(ISA) Server.
CONCLUSION
• Virtual private network technology can be
used to enable remote offices and users to
connect to private networks securely over
public networks.

More Related Content

What's hot

TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
Harsh Singh
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
Die ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratoren
panagenda
 

What's hot (20)

Vpn
VpnVpn
Vpn
 
Introduction to QUIC
Introduction to QUICIntroduction to QUIC
Introduction to QUIC
 
List of usernames and passwords for Huawei routers
List of usernames and passwords for Huawei routersList of usernames and passwords for Huawei routers
List of usernames and passwords for Huawei routers
 
Firewalls
FirewallsFirewalls
Firewalls
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Build and release iOS apps using Fastlane tools
Build and release iOS apps using Fastlane toolsBuild and release iOS apps using Fastlane tools
Build and release iOS apps using Fastlane tools
 
Ftp
FtpFtp
Ftp
 
gRPC Design and Implementation
gRPC Design and ImplementationgRPC Design and Implementation
gRPC Design and Implementation
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
Unraveling the Snake: Turla
Unraveling the Snake: TurlaUnraveling the Snake: Turla
Unraveling the Snake: Turla
 
Secure shell protocol
Secure shell protocolSecure shell protocol
Secure shell protocol
 
OpenStack API's and WSGI
OpenStack API's and WSGIOpenStack API's and WSGI
OpenStack API's and WSGI
 
Die ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratoren
 

Viewers also liked

Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
Murniana Shazwen
 
Sutera menurut al quran dan sains
Sutera menurut al quran dan sainsSutera menurut al quran dan sains
Sutera menurut al quran dan sains
Murniana Shazwen
 
Sutera menurut al quran dan sains
Sutera menurut al quran dan sainsSutera menurut al quran dan sains
Sutera menurut al quran dan sains
Murniana Shazwen
 
Borang soal selidik kbs
Borang soal selidik kbs Borang soal selidik kbs
Borang soal selidik kbs
Azrina Rosli
 
Perkembangan ilmu fizik dlm sejati& tokoh
Perkembangan ilmu fizik dlm sejati& tokohPerkembangan ilmu fizik dlm sejati& tokoh
Perkembangan ilmu fizik dlm sejati& tokoh
Murniana Shazwen
 

Viewers also liked (10)

Data mining
Data miningData mining
Data mining
 
Data mining
Data miningData mining
Data mining
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Sutera menurut al quran dan sains
Sutera menurut al quran dan sainsSutera menurut al quran dan sains
Sutera menurut al quran dan sains
 
Sutera menurut al quran dan sains
Sutera menurut al quran dan sainsSutera menurut al quran dan sains
Sutera menurut al quran dan sains
 
Borang soal selidik kbs
Borang soal selidik kbs Borang soal selidik kbs
Borang soal selidik kbs
 
Perkembangan ilmu fizik dlm sejati& tokoh
Perkembangan ilmu fizik dlm sejati& tokohPerkembangan ilmu fizik dlm sejati& tokoh
Perkembangan ilmu fizik dlm sejati& tokoh
 
Borang rekod solat dirumah
Borang rekod solat dirumahBorang rekod solat dirumah
Borang rekod solat dirumah
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Transport mode virtual private network(vpn)

Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 

Similar to Transport mode virtual private network(vpn) (20)

VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
V P N
V P NV P N
V P N
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn security
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
AWS VPC .pptx
AWS  VPC .pptxAWS  VPC .pptx
AWS VPC .pptx
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Transport mode virtual private network(vpn)

  • 1.
  • 2. VIRTUAL PRIVATE NETWORK is a private and secure network connection between systems that uses the data communication capability of an unsecured and public network.
  • 3. Uses leased circuits from a service provider and conducts packet switching over these leased circuits. use security protocols and encrypt traffic transmitted across unsecured public network like the network. combines the two, providing encrypted transmissions(like secure VPN) over some or all of a trusted VPN network.
  • 4.  Encapsulation of incoming and outgoing data, wherein the native protocol of the client is embedded  Encryption of incoming and outgoing data to keep the data contents private  Authentication of the remote computer and perhaps, the remote user as well.
  • 5. TRANSPORT MODE VPN The data within an IP packet is encrypted but the header information is not. This allows the user to establish a secure link directly with the remote host encrypting only the data contents of the packet. The downside to this implementation is that packet eavesdroppers can still identify the destination system. Once an attacker knows the destination, he or she maybe able to compromise one of the end nodes and acquire the packet information from it. On the other hand, transport mode eliminates the need for special servers and tunneling software and allows the end users to transmit traffic anywhere.
  • 6. i) Two end users can communicate directly, encrypting and decrypting their communications as needed. Each machine acts as the end node VPN server and client.
  • 7. ii) This allows the teleworker’s system to work as if it were part of the local area network. Ex: the VPN server as an intermediate node, encrypting traffic from the secure intranet and transmitting it to the remote client and decrypting traffic from the remote client and transmitting it to its final destination.
  • 8. Tunel Mode VPN • The organization establishes two perimeter tunnel servers that encrypt all traffic that will traverse an unsecured network. • The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server and to another. • The receiving server decrypts, the packet and sends it to the final address.
  • 9. • The primary benefit to this model is that an intercepted packet reveals nothing about the true destination system. • Ex: tunnel mode VPN is provided with Microsoft’s Internet Security and Acceleration (ISA) Server.
  • 10. CONCLUSION • Virtual private network technology can be used to enable remote offices and users to connect to private networks securely over public networks.