SlideShare a Scribd company logo
1 of 19
PRESENTEDBY:
CONTENT
S
 Introduction
 What is a VPN ?
 Types of VPNs
 VPN protocols
 VPNs - Advantages
 VPNs - Disadvantages
 Conclusion
Virtual. Virtual means not real or in a different state of being. In a VPN,
private communication between two or more devices is achieved through a
public network the Internet. Therefore, the communication is virtually but
not physically there.
Private. Private means to keep something a secret from the general public.
Although those two devices are communicating with each other in a public
environment, there is no third party who can interrupt this communication
or receive any data that is exchanged between them.
Network. A network consists of two or more devices that can freely and
electronically communicate with each other via cables and wire. A VPN is
a network. It can transmit information over long distances effectively and
efficiently.
Introduction
contin….
1. A VPN is a combination of software and hardware that allows
mobile employees, telecommuters, business partners, and
remote sites to use a public or "unsecured“ medium such as the
Internet to establish a secure, private connection with a host
network.
2. It uses "virtual" connections routed through the internet from
the business's private network to the remote site.
3. VPN extends a private network and the resources contained in
the network across public networks like the Internet.
Virtual Private Network, is defined as a network that uses public
network paths but maintains the security and protection of private
networks. For example, Delta Company has two locations, one in
Noida, New Delhi (A) and Pune, Mumbai (B). In order for both
locations to communicate efficiently, Delta Company has the choice
to set up private lines between the two locations. Although private
lines would restrict public access and extend the use of their
bandwidth, it will cost Delta Company a great deal of money since
they would have to purchase the communication lines per mile. The
more viable option is to implement a VPN. Delta Company can hook
their communication lines with a local ISP in both cities. The ISP
would act as a middleman, connecting the two locations. This would
create an affordable small area network for Delta Company.
What is a VPN ?
A remote-access VPN connection allows an individual user to connect to a private
business network from a remote location using a laptop or desktop computer connected
to the internet.
Types of VPNs
 Remote access VPN
 Intranet VPN
 Extranet VPN
Types of VPNs
Remote access VPNs – Enable remote connectivity using any
Internet access technology. The remote user launches the VPN client
to create a VPN tunnel to the gateway.
Types of VPNs
Intranet VPNs - If a company has one or more remote locations that
they wish to join in a single private network, they can create an intranet
VPN to connect LAN to LAN.
Types of VPNs
Extranet VPNs – When a company has a close relationship with
another company (for example, a partner, supplier or customer), they can
build an extranet VPN that connects LAN to LAN, and that allows all of
the various companies to work in a shared environment.
Types of VPN protocols
 PPTP--Point-to-Point Tunneling Protocol
 L2TP -- Layer 2 Tunneling Protocol
 IPsec-- Internet Protocol Security
 SSL -- Secure Socket Layer
1.Point-to-Point Tunneling Protocol(PPTP)
PPTP (Point-to-Point Tunneling Protocol) it’s the most widely
supported VPN method among Windows users and it was created by
Microsoft in association with other technology companies. The
disadvantage of PPTP is that it does not provide encryption and it relies
on the PPP (Point-to-Point Protocol) protocol to implement security
measures. But compared to other methods, PPTP is faster and it is also
available for Linux and Mac users.
L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that
supports VPNs. Like PPTP, L2TP does not provide encryption and it
relies on PPP protocol to do this. The difference between PPTP and
L2TP is that the second one provides not only data confidentiality but
also data integrity. L2TP was developed by Microsoft and Cisco as a
combination between PPTP and L2F(Layer 2 Forwarding).
2.Layer 2 Tunneling Protocol(L2TP)
IPsec protocol can be used for encryption in correlation with L2TP
tunneling protocol. It is used as a “protocol suite for securing Internet
Protocol (IP) communications by authenticating and encrypting each IP
packet of a data stream”. IPSec requires expensive, time consuming
client installations and this can be considered an important disadvantage.
3.Internet Protocol Security(IPsec)
SSL (Secure Socket Layer) is a VPN accessible via https over
web browser. The advantage of this SSL VPN is that it doesn’t
need any software installed because it uses the web browser as
the client application. Through SSL VPNs the user’s access
can be restrict to specific applications instead of allowing
access to the whole network.
4.Secure Socket Layer(SSL)
 Eliminate the need for expensive private or leased lines
 Reduce the long-distance telephone charges
 Reduced equipment costs (modem banks, CSU/DSUs)
 Reduced technical support
 Scalability – easy adding of new locations to the VPN
 Security
 Simple Management
 Lower Cost
VPNs - Advantages
VPNs - Disadvantages
 Require an in-depth understanding of public network security issues
and taking proper precautions in VPN deployment.
 The availability and performance of a corporate VPN (over the
Internet) depends on uncontrollable external factors.
 Shortage of standardization. The products from different vendors may
not work well together.
 VPNs need to accommodate complicated protocols other than IP.
Conclusion
VPN is an emerging technology that has come a long way. From an
insecure break off of Public Telephone networks to a powerful business
aid that uses the Internet as its gateway. VPN’s technology is still
developing, and this is a great advantage to businesses, which need to
have technology that is able to scale and grow along with them. With
VPN businesses now have alternative benefits to offer to their
employees, employees can work from home, take care of children while
still doing productive, and have access work related information at
anytime. VPN will also help to make the possibility of a business
expanding its services over long distances and globally, more of a reality.
Virtual Private Network

More Related Content

What's hot

What's hot (20)

Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Vpn
VpnVpn
Vpn
 
Vpn
VpnVpn
Vpn
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
VPN
VPNVPN
VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Vpn
VpnVpn
Vpn
 
Vpn
VpnVpn
Vpn
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vlan
Vlan Vlan
Vlan
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 

Viewers also liked

VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

Viewers also liked (16)

What Is VPN
What Is VPNWhat Is VPN
What Is VPN
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Hyperloop
HyperloopHyperloop
Hyperloop
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Similar to Virtual Private Network

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdfVograce
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxtodd521
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 

Similar to Virtual Private Network (20)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
AWS VPC .pptx
AWS  VPC .pptxAWS  VPC .pptx
AWS VPC .pptx
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
 
VPN
VPN VPN
VPN
 

Recently uploaded

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Recently uploaded (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Virtual Private Network

  • 2. CONTENT S  Introduction  What is a VPN ?  Types of VPNs  VPN protocols  VPNs - Advantages  VPNs - Disadvantages  Conclusion
  • 3. Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently. Introduction
  • 4. contin…. 1. A VPN is a combination of software and hardware that allows mobile employees, telecommuters, business partners, and remote sites to use a public or "unsecured“ medium such as the Internet to establish a secure, private connection with a host network. 2. It uses "virtual" connections routed through the internet from the business's private network to the remote site. 3. VPN extends a private network and the resources contained in the network across public networks like the Internet.
  • 5. Virtual Private Network, is defined as a network that uses public network paths but maintains the security and protection of private networks. For example, Delta Company has two locations, one in Noida, New Delhi (A) and Pune, Mumbai (B). In order for both locations to communicate efficiently, Delta Company has the choice to set up private lines between the two locations. Although private lines would restrict public access and extend the use of their bandwidth, it will cost Delta Company a great deal of money since they would have to purchase the communication lines per mile. The more viable option is to implement a VPN. Delta Company can hook their communication lines with a local ISP in both cities. The ISP would act as a middleman, connecting the two locations. This would create an affordable small area network for Delta Company. What is a VPN ?
  • 6. A remote-access VPN connection allows an individual user to connect to a private business network from a remote location using a laptop or desktop computer connected to the internet.
  • 7. Types of VPNs  Remote access VPN  Intranet VPN  Extranet VPN
  • 8. Types of VPNs Remote access VPNs – Enable remote connectivity using any Internet access technology. The remote user launches the VPN client to create a VPN tunnel to the gateway.
  • 9. Types of VPNs Intranet VPNs - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.
  • 10. Types of VPNs Extranet VPNs – When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 11. Types of VPN protocols  PPTP--Point-to-Point Tunneling Protocol  L2TP -- Layer 2 Tunneling Protocol  IPsec-- Internet Protocol Security  SSL -- Secure Socket Layer
  • 12. 1.Point-to-Point Tunneling Protocol(PPTP) PPTP (Point-to-Point Tunneling Protocol) it’s the most widely supported VPN method among Windows users and it was created by Microsoft in association with other technology companies. The disadvantage of PPTP is that it does not provide encryption and it relies on the PPP (Point-to-Point Protocol) protocol to implement security measures. But compared to other methods, PPTP is faster and it is also available for Linux and Mac users.
  • 13. L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that supports VPNs. Like PPTP, L2TP does not provide encryption and it relies on PPP protocol to do this. The difference between PPTP and L2TP is that the second one provides not only data confidentiality but also data integrity. L2TP was developed by Microsoft and Cisco as a combination between PPTP and L2F(Layer 2 Forwarding). 2.Layer 2 Tunneling Protocol(L2TP)
  • 14. IPsec protocol can be used for encryption in correlation with L2TP tunneling protocol. It is used as a “protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream”. IPSec requires expensive, time consuming client installations and this can be considered an important disadvantage. 3.Internet Protocol Security(IPsec)
  • 15. SSL (Secure Socket Layer) is a VPN accessible via https over web browser. The advantage of this SSL VPN is that it doesn’t need any software installed because it uses the web browser as the client application. Through SSL VPNs the user’s access can be restrict to specific applications instead of allowing access to the whole network. 4.Secure Socket Layer(SSL)
  • 16.  Eliminate the need for expensive private or leased lines  Reduce the long-distance telephone charges  Reduced equipment costs (modem banks, CSU/DSUs)  Reduced technical support  Scalability – easy adding of new locations to the VPN  Security  Simple Management  Lower Cost VPNs - Advantages
  • 17. VPNs - Disadvantages  Require an in-depth understanding of public network security issues and taking proper precautions in VPN deployment.  The availability and performance of a corporate VPN (over the Internet) depends on uncontrollable external factors.  Shortage of standardization. The products from different vendors may not work well together.  VPNs need to accommodate complicated protocols other than IP.
  • 18. Conclusion VPN is an emerging technology that has come a long way. From an insecure break off of Public Telephone networks to a powerful business aid that uses the Internet as its gateway. VPN’s technology is still developing, and this is a great advantage to businesses, which need to have technology that is able to scale and grow along with them. With VPN businesses now have alternative benefits to offer to their employees, employees can work from home, take care of children while still doing productive, and have access work related information at anytime. VPN will also help to make the possibility of a business expanding its services over long distances and globally, more of a reality.