Vpn

Presented By : SURENDRA BANE.
                 Class : T. E.
                  Roll No : 02
                A.Y. : 2012-13

Under The Guidance Of : Prof. Prerna Shinde.
CONTENTS
Introduction
Traditional Connectivity
Why VPN is needed ?
Principle
How it works?
Tunneling
Four Protocols
Critical Function
VPN Technologies
Applications and Real-time example
Advantages and Disadvantages
Future
Conclusion
INTRODUCTION
What is VPN ?

Virtual Private Network is a type of private network
that uses public telecommunication, such as the
Internet, instead of leased lines to communicate.

Became popular as more employees worked in remote
locations.

Terminologies to understand how VPNs work.
TRADITIONAL CONNECTIVITY
VIRTUAL PRIVATE NETWORK
           VS.
    PRIVATE NETWORK
Employees can access the network
(Intranet) from remote locations.
Secured networks.
The Internet is used as the backbone for
VPNs
Saves cost tremendously from reduction of
equipment and maintenance costs.
PRINCIPLE

“A Virtual Private Network (VPN) is a
network constructed over the Internet and
other existing networks, that allows easy
and secure data transfers between the
participants.”
HOW IT WORKS ?
Two connections – one is made to the Internet and the
second is made to the VPN.

Datagrams – contains data, destination and source
information.

Firewalls – VPNs allow authorized users to pass through
the firewalls.

Protocols – protocols create the VPN tunnels.
VIRTUAL PRIVATE
NETWORK(VPN)
 Basic Architecture
TUNNELING
A virtual point–to–point connection made through
Public Network.
It transport Encapsulated datagrams.
FOUR PROTOCOLS IN VPN
PPTP -- Point-to-Point Tunneling Protocol.

L2TP -- Layer 2 Tunneling Protocol.

IPsec -- Internet Protocol Security.

SOCKS – is not used as much as the ones above
FOUR CRITICAL FUNCTION
Authentication – validates that the data was sent from
the authorized sender

Access control – give access to only authorized users.

Confidentiality – preventing the data to be read or
copied as the data is being transported.

Data Integrity – maintaining and assuring the accuracy
and consistency of data.
VPN TECHNOLOGIES
1 : Trusted VPN
   Provide assurance of properties of paths such as QoS.
   No security.

2 : Secure VPN
   Provide Security.
   No assurance of paths.

3 : Hybrid VPN
 Provide Secure and Trusted VPNs.
 Company already have Trusted VPN and need Security.
APPLICATION : REMOTE ACCESS

Secure connection – own computer to VPN router.

Easily access email, data, files at work from
outside through Internet.

 VPN allows mobile workers & telecommuters to
take advantage of broadband connectivity.
Remote Access Virtual Private
         Network
APPLICATION : SITE-TO-SITE

 Data is encrypted from one VPN gateway to other
 by secure link between two sites over internet.

 This would enable both sites to share resources –
 documents, other data over VPN link.

 This saves the company           hardware    and
 management expenses.
Site-to-Site VPNs
REAL TIME EXAMPLE
Health care company Intranet Deployment
ADVANTAGES
     AND
DISADVANTAGES
ADVANTEGES
 Eliminating the need for expensive long-
distance leased lines
 Reducing the long-distance telephone
charges for remote access.
 data integrity and privacy is achieved.
 Reduced Operational costs.
 Flexibility of growth .
DISADVANTAGES

VPNs require an in-depth understanding of
public network, security issues and proper
deployment of precautions.

 VPNs need to accommodate protocols other
than IP and existing internal network
technology.
Where Do We See VPNs Going in
         the Future?
As the VPN market becomes larger, more applications
will be created along with more VPN providers and new
VPN types.

Networks are expected to converge to create an
integrated VPN.

Improvement of protocols are expected, which will also
improve VPNs.
CONCLUSION
 VPNs allow users to connect to remote
servers, branch offices, or to other
companies       over     a       public
internetwork, while maintaining secure
communications.

 A VPN, only requires a broadband
internet connection
THANK YOU !!!
1 de 23

Recomendados

VPN por
VPNVPN
VPNShiraz316
2.7K vistas39 diapositivas
Virtual private networks (vpn) por
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
1.3K vistas27 diapositivas
Vpn presentation por
Vpn presentationVpn presentation
Vpn presentationstolentears
36.2K vistas18 diapositivas
Virtual private network por
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
21.4K vistas26 diapositivas
VPN, Its Types,VPN Protocols,Configuration and Benefits por
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
3.6K vistas49 diapositivas
Virtual Private Network por
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
2.9K vistas21 diapositivas

Más contenido relacionado

La actualidad más candente

Vpn ppt por
Vpn pptVpn ppt
Vpn pptNikhila Pothukuchi
4.7K vistas9 diapositivas
Virtual Private Network main por
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
1.8K vistas28 diapositivas
Virtual Private Network VPN por
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPNFarah M. Altufaili
2.7K vistas10 diapositivas
Vpn presentation por
Vpn presentationVpn presentation
Vpn presentationKuldeep Padhiyar
7.5K vistas14 diapositivas
Software Defined Network - SDN por
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
15.9K vistas26 diapositivas

La actualidad más candente(20)

Virtual Private Network main por Kanika Gupta
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta1.8K vistas
VPN - Virtual Private Network por Peter R. Egli
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli21.1K vistas
CCNA Introducing Networks por Dsunte Wilson
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson22.7K vistas
Cisco SDWAN - Components Deployment Workflow por Farooq Khan
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
Farooq Khan193 vistas
Software defined networking(sdn) vahid sadri por Vahid Sadri
Software defined networking(sdn) vahid sadriSoftware defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadri
Vahid Sadri1.5K vistas
Report File On Virtual Private Network(VPN) por Rajendra Dangwal
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
Rajendra Dangwal6.2K vistas
Basic Concepts of Networking por Vivin NL
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of Networking
Vivin NL2.3K vistas
enterprise network design architecture por Amir Hossain
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
Amir Hossain7.7K vistas
Networking Components por AkNirojan
Networking ComponentsNetworking Components
Networking Components
AkNirojan1.7K vistas

Similar a Vpn

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA por
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
362 vistas15 diapositivas
Virtual Private Networks (VPN) ppt por
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptOECLIB Odisha Electronics Control Library
32.4K vistas19 diapositivas
csevpnppt-170905123948 (1).pdf por
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
7 vistas19 diapositivas
Vvirtualnet-basic.ppt por
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
1 vista26 diapositivas
Vpn por
VpnVpn
VpnKajal Thakkar
47.1K vistas46 diapositivas
Vpn networks kami por
Vpn networks kamiVpn networks kami
Vpn networks kamikamran_share
1.5K vistas36 diapositivas

Similar a Vpn(20)

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA por Saikiran Panjala
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala362 vistas
csevpnppt-170905123948 (1).pdf por HirazNor
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor7 vistas
Vpn networks kami por kamran_share
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share1.5K vistas
Virtual Private Network- VPN por Nikhil Kumar
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar1.2K vistas
Presentation vpn por Areeba Gill
Presentation vpnPresentation vpn
Presentation vpn
Areeba Gill754 vistas
Virtual Private Networks Commonly Called As Vpn por Michele Lata
Virtual Private Networks Commonly Called As VpnVirtual Private Networks Commonly Called As Vpn
Virtual Private Networks Commonly Called As Vpn
Michele Lata7 vistas
The Potential Threats And Risks That Have Home And... por Cyndi Ruppel
The Potential Threats And Risks That Have Home And...The Potential Threats And Risks That Have Home And...
The Potential Threats And Risks That Have Home And...
Cyndi Ruppel2 vistas
Virtual Private Network por Richa Singh
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh960 vistas
IRJET- A Survey of Working on Virtual Private Networks por IRJET Journal
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal10 vistas
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx por todd521
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd5212 vistas
A Report On Virtual Private Network Essay por Jessica Reed
A Report On Virtual Private Network EssayA Report On Virtual Private Network Essay
A Report On Virtual Private Network Essay
Jessica Reed5 vistas

Vpn

  • 1. Presented By : SURENDRA BANE. Class : T. E. Roll No : 02 A.Y. : 2012-13 Under The Guidance Of : Prof. Prerna Shinde.
  • 2. CONTENTS Introduction Traditional Connectivity Why VPN is needed ? Principle How it works? Tunneling Four Protocols Critical Function VPN Technologies Applications and Real-time example Advantages and Disadvantages Future Conclusion
  • 3. INTRODUCTION What is VPN ? Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations. Terminologies to understand how VPNs work.
  • 5. VIRTUAL PRIVATE NETWORK VS. PRIVATE NETWORK Employees can access the network (Intranet) from remote locations. Secured networks. The Internet is used as the backbone for VPNs Saves cost tremendously from reduction of equipment and maintenance costs.
  • 6. PRINCIPLE “A Virtual Private Network (VPN) is a network constructed over the Internet and other existing networks, that allows easy and secure data transfers between the participants.”
  • 7. HOW IT WORKS ? Two connections – one is made to the Internet and the second is made to the VPN. Datagrams – contains data, destination and source information. Firewalls – VPNs allow authorized users to pass through the firewalls. Protocols – protocols create the VPN tunnels.
  • 9. TUNNELING A virtual point–to–point connection made through Public Network. It transport Encapsulated datagrams.
  • 10. FOUR PROTOCOLS IN VPN PPTP -- Point-to-Point Tunneling Protocol. L2TP -- Layer 2 Tunneling Protocol. IPsec -- Internet Protocol Security. SOCKS – is not used as much as the ones above
  • 11. FOUR CRITICAL FUNCTION Authentication – validates that the data was sent from the authorized sender Access control – give access to only authorized users. Confidentiality – preventing the data to be read or copied as the data is being transported. Data Integrity – maintaining and assuring the accuracy and consistency of data.
  • 12. VPN TECHNOLOGIES 1 : Trusted VPN Provide assurance of properties of paths such as QoS. No security. 2 : Secure VPN Provide Security. No assurance of paths. 3 : Hybrid VPN Provide Secure and Trusted VPNs. Company already have Trusted VPN and need Security.
  • 13. APPLICATION : REMOTE ACCESS Secure connection – own computer to VPN router. Easily access email, data, files at work from outside through Internet. VPN allows mobile workers & telecommuters to take advantage of broadband connectivity.
  • 14. Remote Access Virtual Private Network
  • 15. APPLICATION : SITE-TO-SITE Data is encrypted from one VPN gateway to other by secure link between two sites over internet. This would enable both sites to share resources – documents, other data over VPN link. This saves the company hardware and management expenses.
  • 17. REAL TIME EXAMPLE Health care company Intranet Deployment
  • 18. ADVANTAGES AND DISADVANTAGES
  • 19. ADVANTEGES Eliminating the need for expensive long- distance leased lines Reducing the long-distance telephone charges for remote access. data integrity and privacy is achieved. Reduced Operational costs. Flexibility of growth .
  • 20. DISADVANTAGES VPNs require an in-depth understanding of public network, security issues and proper deployment of precautions. VPNs need to accommodate protocols other than IP and existing internal network technology.
  • 21. Where Do We See VPNs Going in the Future? As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. Networks are expected to converge to create an integrated VPN. Improvement of protocols are expected, which will also improve VPNs.
  • 22. CONCLUSION VPNs allow users to connect to remote servers, branch offices, or to other companies over a public internetwork, while maintaining secure communications. A VPN, only requires a broadband internet connection