0% found this document useful (0 votes)
175 views22 pages

Virtual Private Network (VPN)

Virtual Private Networks (VPNs) allow users to connect to a private network from a remote location over a public network like the Internet. There are three main types of VPNs: remote-access VPNs for individual users, intranet-based site-to-site VPNs to connect multiple office locations, and extranet-based site-to-site VPNs to securely connect a company's network to a partner's network. VPNs use protocols like IPsec and PPTP along with encryption to securely transmit data across the public network by creating virtual private tunnels between devices. This allows remote users to securely access a private network and provides cost and connectivity benefits compared to traditional private networks with leased lines.

Uploaded by

mridul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views22 pages

Virtual Private Network (VPN)

Virtual Private Networks (VPNs) allow users to connect to a private network from a remote location over a public network like the Internet. There are three main types of VPNs: remote-access VPNs for individual users, intranet-based site-to-site VPNs to connect multiple office locations, and extranet-based site-to-site VPNs to securely connect a company's network to a partner's network. VPNs use protocols like IPsec and PPTP along with encryption to securely transmit data across the public network by creating virtual private tunnels between devices. This allows remote users to securely access a private network and provides cost and connectivity benefits compared to traditional private networks with leased lines.

Uploaded by

mridul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

VIRTUAL PRIVATE NETWORK

(VPN)
Content
Traditional Connectivity
What is VPN
Types of VPN’s
How does it work?
Protocols
Security: Firewalls
VPN Devices
Advantages
Disadvantages
Features
Future
Conclusion
Traditional Connectivity
What is VPN
Virtual Private Network is a type of

private network that uses public
telecommunication, such as the
Internet, instead of leased lines to
communicate.

Became popular as more



employees worked in remote
locations.

Terminologies to understand how



VPNs work.
Types of VPN’s
Remote-Access VPN

Site-to-Site VPN (Intranet-based)

Site-to-Site VPN (Extranet-based)


Remote-Access VPN
 A remote access VPN is for home or travelling
users who need to access their central LAN from a
remote location.
They dial their ISP and connect over the internet
to the LAN.
This is made possible by installing a client
software program on the remote user’s laptop or
PC that deals with the encryption and decryption
of the VPN traffic between itself and the VPN
gateway on the central LAN.
Site-to-Site VPN
Intranet-based - If a company has one or more
remote locations that they wish to join in a single
private network, they can create an intranet VPN to
connect LAN to LAN.
Extranet-based - When a company has a close
relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that
allows all of the various companies to work in a
shared environment.
All 3 types of VPN
Brief Overview of How it Works
 Two connections – one is made to the Internet and the
second is made to the VPN.
 Datagrams – contains data, destination and source
information.
 Firewalls – VPNs allow authorized users to pass
through the firewalls.
 Protocols – protocols create the VPN tunnels.
Four Critical Functions
Authentication – validates that the data was sent from the
sender.
Access control – limiting unauthorized users from
accessing the network.
Confidentiality – preventing the data to be read or copied
as the data is being transported.
Data Integrity – ensuring that the data has not been
altered
Encryption
Encryption -- is a method of “scrambling” data before
transmitting it onto the Internet.

Public Key Encryption Technique

Digital signature – for authentication


VPN Architecture
Protocols used in VPN
PPTP - Point-to-point tunneling protocol
L2Tp – Layers to Tunneling Protocol
IPSec - Internet protocol security
SSL – is not used as much as the ones above.
Encryption
VPN Security: Firewall
A well-designed VPN uses several methods for keeping
your connection and data secure:
Firewalls
Encryption
IPSec
AAA Server

You can set firewalls to restrict the number of open


ports, what type of packets are passed through and
which protocols are allowed through.
VPN Advantages
Multiple telephone lines and banks of modems at the
central site are not required.
 A reduction in the overall telecommunication
infrastructure – as the ISP provides the bulk of the
network.
 Reduced cost of management, maintenance of equipment
and technical support.
 Simplifies network topology by eliminating modem pools
and a private network infrastructure.
 VPN functionality is already present in some IT
equipment.
VPN Disadvantage
If the ISP or Internet connection is down, so is the
VPN.
 The central site must have a permanent internet
connection so that remote clients and other sites can
connect at anytime.
VPNs may provide each user with less bandwidth than
a dedicated line solution.
 Existing firewalls, proxies, routers and hubs may not
support VPN transmissions.
VPN Features
Security – tunneling support between sites with at
least 128bit encryption of the data.
Scalability – extra users and bandwidth can be added
easily to adapt to new requirements.
Services – quality of service features, including
bandwidth, management and traffic shaping, are
important to avoid congestion.
 Management – reports on user activity, management
of user policies and monitoring of the VPN as a whole.
Future of VPN
VPN popularity
 Companies choosing VPN
 Cost efficient?
 New way of communicating?
Future of VPN: Companies with VPN
Conclusion
As we have gone through all possible details we
conclude that VPN is the best option for the corporate
networking.
As many companies need to have access to Internet
and hence security is also the main concern.
 VPN provides best possible combination of security
and private network capabilities with adequate cost –
saving to the companies who are presently working
with leased lines.
THANKS

You might also like