SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
The Virtual Private
Network
A quick
overview
What	 is	 the	 Virtual	 Private	 
Network?
VPN is termed as the connectivity, deployed on a Shared
Infrastructure with the same policies and ‘Performance’ as
a private Network.
© 2000, Cisco Systems, Inc.
2400
1190_05_2000_c2
Main
Office
Home
Office
POP
Mobile
Worker
Business
Partner
Remote
Office
Regional
Office
Connectivity Deployed on a Shared
Infrastructure with the Same Policies and
‘Performance’ as a Private Network
Virtual Private
Network
A virtual private network can be contrasted with an
expensive system of owned or leased lines that can
only be used by one organisation.
The goal of a VPN is to provide the organisation with
the same capabilities, but at a much lower cost.
A VPN works by using the shared public
infrastructure while maintaining privacy through
security procedures and tunnelling protocols.
In effect, the protocols, by encrypting data at the
sending end and decrypting it at the receiving end,
send the data through a “tunnel” that cannot be
“entered” by data that is not properly generated.
An additional level of security involves encrypting not
only the data, but also the originating and receiving
network addresses.
How does the VPN works?
Types of VPN
Intranet VPN
Extends the connectionless IP model across a shared WAN

—> Reduces application development time

—> Reduces support costs

—>Reduces line costs 13© 2000, Cisco Systems, Inc.
2400
1190_05_2000_c2
Main
Office
Remote
Office
Remote
Office
Service Provider
POP
POP
POP
Internet/
IP VPNs
VPN Types: Intranet VPNVPN Types: Intranet VPN
• Extends the connectionless
IP model across a shared WAN
Reduces application development time
Reduces support costs
Reduces line costs
Extranet VPN
Extends connectivity to suppliers, customers, and business partners.
Over a shared infrastructures.
Using dedicated connections
While ensuring proper level of authorised access
14© 2000, Cisco Systems, Inc.
2400
1190_05_2000_c2
Service Provider
Business
Partner
Supplier
Customer
Main
Office
POPPOP
POPPOP
POPPOP
Remote
Office
Remote
Office
VPN Types: Extranet VPNVPN Types: Extranet VPN
• Extend connectivity to suppliers, customers, and business partners
• Over a shared infrastructure
• Using dedicated connections
• While ensuring proper level of authorized access
Internet/
IP VPNs
Router/Firewall initiated VPN
For site to site connectivity - internets and extranets.
POP
Internet
Remote Router or Firewall Initiated
POP
IPSec
Encrypted
Tunnel
Router/Firewall-Initiated VPNRouter/Firewall-Initiated VPN
Benefits of VPN
Extend geographic connectivity
Improve security
Reduce operational costs versus traditional WAN.
Reduce transit time and transportation cost for remote users.
Improve Productivity
Simplify network
Provides global networking opportunities
Easy to configure
Provide telecommuter support
Used to access BLOCKED websites
VPN Security
A well-designed VPN uses several
methods for keeping your connection
and data secure:
Fire walls
Encryption
Sec
AAA server
VPN uses encryption to provide the data confidentiality.
Once connected, the VPN makes use of the tunnelling
mechanism to encapsulate encrypted data into a secure
tunnel, with openly read headers, which can cross the
public networks.
VPN also provides the data integrity check.This is typically
performed using a message digest to ensure that the data
has not been tampered with during transmission.
VPN Security
Firewalls
Provides a strong barrier
between your private
network and the internet.
You can set firewalls to
restrict the numbers of
ports, what types of
packets are passed
through and which
protocols are allowed
through.
Encryption
Process of taking all the
data that one computer
is sending to another
and encoding it into a
form that only the other
computer will be able to
decode.
IPSec
Internet Protocol
Security Protocol (IPSec)
provides enhanced
security features such as
better encryption
algorithms and more
comprehensive
authentication.
Creating Dial up VPN on
windows server 2008R2
Conditions:

>IP address should be static

>firewall should be turned off

> computers must be in a network

>domain should be built already
Go to server manager, install the RRAS
role from the Administrative tools.
Follow the onscreen instructions with a
desired choice of options as according
you want to build the VPN.
Risks and Limitations
Hacking Attacks
VPN Hijacking is the unauthorised take-over of an
established VPN connection from a remote client, and
impersonating that client on the connecting network.
Man-in-Middle attacks affect traffic being sent between
communicating parties , and can include interception,
insertion, deletion, and modification of messages,
reflecting messages back at the sender, repaying old
messages and redirecting messages.
User Authentication
By default, VPN does not provide/enforce strong user
authentication. A VPN connection should only be
established by an authenticated user. If the
authentication is not strong enough to restrict
unauthorised access, an unauthorised party could
access the connected network and its resources. Most
VPN implementations provide limited authentications
methods. For example, PAP, used in PPTP, transports
both username and password in clear text. A third party
could capture this information and use it to gain
subsequent access to the network.
Client-Side risks
The VPN client machines of, say, home users may be
connected to the Internet via a standard broadband
connection while at the same time holding a VPN connection
to a private network, using split tunnelling. This may pose a
risk to the private network being connected to.
A client machine may also be shared with other parties who
are not fully aware of the security implications. In addition, a
laptop used by a mobile user may be connected to the
Internet, a wireless LAN at a hotel, airport or on other foreign
networks. However, the security protection in most of these
public connection points is inadequate for VPN access. If the
VPN client machine is compromised, either before or during
the connection, this poses a risk to the connecting network.
Virus/ Malware Infections
A connecting network can be compromised if the client
side is infected with a virus. If a virus or spyware
infects a client machine, there is chance that the
password for the VPN connection might be leaked to
an attacker. In the case of an intranet or extranet VPN
connection, if one network is infected by a virus or
worm, that virus / worm can be spread quickly to other
networks if anti-virus protection systems are ineffective.
Conclusion
VPN provides a means of accessing a secure, private,
internal network over insecure public networks such as
the Internet. A number of VPN technologies have been
outlined, among which IPsec and SSL VPN are the
most common. Although a secure communication
channel can be opened and tunnelled through an
insecure network via VPN, client side security should
not be overlooked.
–Abhinav Dwivedi
“Thank You”
Made by Apple Keynote

Más contenido relacionado

La actualidad más candente

Presentation vpn
Presentation vpnPresentation vpn
Presentation vpnAreeba Gill
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentationAmjad Bhutto
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 

La actualidad más candente (20)

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn security
Vpn security Vpn security
Vpn security
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Firewall
Firewall Firewall
Firewall
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
VPN
VPNVPN
VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

Destacado

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkBijaya Khadka
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Rajendra Dangwal
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private networkHabibullah Adel
 

Destacado (12)

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Vpn 3 13_07
Vpn 3 13_07Vpn 3 13_07
Vpn 3 13_07
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn virtual private network
Vpn virtual private networkVpn virtual private network
Vpn virtual private network
 

Similar a The Virtual Private Network

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technologyferasfarag
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptxSonuSingh81247
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptshabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 

Similar a The Virtual Private Network (20)

Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
IIT INDOR VPN AND NETWORK Security Control.pptx
IIT INDOR VPN AND NETWORK  Security Control.pptxIIT INDOR VPN AND NETWORK  Security Control.pptx
IIT INDOR VPN AND NETWORK Security Control.pptx
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
vpn
vpnvpn
vpn
 
Vpn
VpnVpn
Vpn
 

Último

20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdfkhraisr
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?RemarkSemacio
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangeThinkInnovation
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...SOFTTECHHUB
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRajesh Mondal
 
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...vershagrag
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraGovindSinghDasila
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...nirzagarg
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...kumargunjan9515
 
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...kumargunjan9515
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...HyderabadDolls
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...HyderabadDolls
 
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...HyderabadDolls
 

Último (20)

20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rohtak [ 7014168258 ] Call Me For Genuine Models We...
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
 

The Virtual Private Network

  • 2. What is the Virtual Private Network? VPN is termed as the connectivity, deployed on a Shared Infrastructure with the same policies and ‘Performance’ as a private Network. © 2000, Cisco Systems, Inc. 2400 1190_05_2000_c2 Main Office Home Office POP Mobile Worker Business Partner Remote Office Regional Office Connectivity Deployed on a Shared Infrastructure with the Same Policies and ‘Performance’ as a Private Network Virtual Private Network
  • 3. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organisation. The goal of a VPN is to provide the organisation with the same capabilities, but at a much lower cost.
  • 4. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunnelling protocols. In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a “tunnel” that cannot be “entered” by data that is not properly generated. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.
  • 5. How does the VPN works?
  • 6.
  • 8. Intranet VPN Extends the connectionless IP model across a shared WAN
 —> Reduces application development time
 —> Reduces support costs
 —>Reduces line costs 13© 2000, Cisco Systems, Inc. 2400 1190_05_2000_c2 Main Office Remote Office Remote Office Service Provider POP POP POP Internet/ IP VPNs VPN Types: Intranet VPNVPN Types: Intranet VPN • Extends the connectionless IP model across a shared WAN Reduces application development time Reduces support costs Reduces line costs
  • 9. Extranet VPN Extends connectivity to suppliers, customers, and business partners. Over a shared infrastructures. Using dedicated connections While ensuring proper level of authorised access 14© 2000, Cisco Systems, Inc. 2400 1190_05_2000_c2 Service Provider Business Partner Supplier Customer Main Office POPPOP POPPOP POPPOP Remote Office Remote Office VPN Types: Extranet VPNVPN Types: Extranet VPN • Extend connectivity to suppliers, customers, and business partners • Over a shared infrastructure • Using dedicated connections • While ensuring proper level of authorized access Internet/ IP VPNs
  • 10. Router/Firewall initiated VPN For site to site connectivity - internets and extranets. POP Internet Remote Router or Firewall Initiated POP IPSec Encrypted Tunnel Router/Firewall-Initiated VPNRouter/Firewall-Initiated VPN
  • 11.
  • 12. Benefits of VPN Extend geographic connectivity Improve security Reduce operational costs versus traditional WAN. Reduce transit time and transportation cost for remote users. Improve Productivity Simplify network Provides global networking opportunities Easy to configure Provide telecommuter support Used to access BLOCKED websites
  • 13.
  • 15. A well-designed VPN uses several methods for keeping your connection and data secure: Fire walls Encryption Sec AAA server
  • 16. VPN uses encryption to provide the data confidentiality. Once connected, the VPN makes use of the tunnelling mechanism to encapsulate encrypted data into a secure tunnel, with openly read headers, which can cross the public networks. VPN also provides the data integrity check.This is typically performed using a message digest to ensure that the data has not been tampered with during transmission. VPN Security
  • 17. Firewalls Provides a strong barrier between your private network and the internet. You can set firewalls to restrict the numbers of ports, what types of packets are passed through and which protocols are allowed through.
  • 18. Encryption Process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode.
  • 19. IPSec Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication.
  • 20. Creating Dial up VPN on windows server 2008R2 Conditions:
 >IP address should be static
 >firewall should be turned off
 > computers must be in a network
 >domain should be built already Go to server manager, install the RRAS role from the Administrative tools. Follow the onscreen instructions with a desired choice of options as according you want to build the VPN.
  • 22. Hacking Attacks VPN Hijacking is the unauthorised take-over of an established VPN connection from a remote client, and impersonating that client on the connecting network. Man-in-Middle attacks affect traffic being sent between communicating parties , and can include interception, insertion, deletion, and modification of messages, reflecting messages back at the sender, repaying old messages and redirecting messages.
  • 23. User Authentication By default, VPN does not provide/enforce strong user authentication. A VPN connection should only be established by an authenticated user. If the authentication is not strong enough to restrict unauthorised access, an unauthorised party could access the connected network and its resources. Most VPN implementations provide limited authentications methods. For example, PAP, used in PPTP, transports both username and password in clear text. A third party could capture this information and use it to gain subsequent access to the network.
  • 24. Client-Side risks The VPN client machines of, say, home users may be connected to the Internet via a standard broadband connection while at the same time holding a VPN connection to a private network, using split tunnelling. This may pose a risk to the private network being connected to. A client machine may also be shared with other parties who are not fully aware of the security implications. In addition, a laptop used by a mobile user may be connected to the Internet, a wireless LAN at a hotel, airport or on other foreign networks. However, the security protection in most of these public connection points is inadequate for VPN access. If the VPN client machine is compromised, either before or during the connection, this poses a risk to the connecting network.
  • 25. Virus/ Malware Infections A connecting network can be compromised if the client side is infected with a virus. If a virus or spyware infects a client machine, there is chance that the password for the VPN connection might be leaked to an attacker. In the case of an intranet or extranet VPN connection, if one network is infected by a virus or worm, that virus / worm can be spread quickly to other networks if anti-virus protection systems are ineffective.
  • 26. Conclusion VPN provides a means of accessing a secure, private, internal network over insecure public networks such as the Internet. A number of VPN technologies have been outlined, among which IPsec and SSL VPN are the most common. Although a secure communication channel can be opened and tunnelled through an insecure network via VPN, client side security should not be overlooked.