SlideShare uma empresa Scribd logo
1 de 17
VIRTUAL PRIVATEVIRTUAL PRIVATE
NETWORKS (VPN)NETWORKS (VPN)
Traditional ConnectivityTraditional Connectivity
What is VPN?What is VPN?
Virtual Private Network is a type of privateVirtual Private Network is a type of private
network that uses public telecommunication,network that uses public telecommunication,
such as the Internet, instead of leased lines tosuch as the Internet, instead of leased lines to
communicate.communicate.
Became popular as more employees worked inBecame popular as more employees worked in
remote locations.remote locations.
Terminologies to understand how VPNs work.Terminologies to understand how VPNs work.
Private NetworksPrivate Networks
vs.vs.
Virtual Private NetworksVirtual Private Networks
Employees can access the network (Intranet)Employees can access the network (Intranet)
from remote locations.from remote locations.
Secured networks.Secured networks.
The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs
Saves cost tremendously from reduction ofSaves cost tremendously from reduction of
equipment and maintenance costs.equipment and maintenance costs.
ScalabilityScalability
Remote Access Virtual PrivateRemote Access Virtual Private
NetworkNetwork
Brief Overview of How it WorksBrief Overview of How it Works
Two connections – one is made to theTwo connections – one is made to the
Internet and the second is made to theInternet and the second is made to the
VPN.VPN.
Datagrams – contains data, destinationDatagrams – contains data, destination
and source information.and source information.
Firewalls – VPNs allow authorized usersFirewalls – VPNs allow authorized users
to pass through the firewalls.to pass through the firewalls.
Protocols – protocols create the VPNProtocols – protocols create the VPN
tunnels.tunnels.
Four Critical FunctionsFour Critical Functions
AuthenticationAuthentication – validates that the data was– validates that the data was
sent from the sender.sent from the sender.
Access controlAccess control – limiting unauthorized users– limiting unauthorized users
from accessing the network.from accessing the network.
ConfidentialityConfidentiality – preventing the data to be– preventing the data to be
read or copied as the data is beingread or copied as the data is being
transported.transported.
Data IntegrityData Integrity – ensuring that the data has– ensuring that the data has
not been alterednot been altered
EncryptionEncryption
Encryption -- is a method of “scrambling”Encryption -- is a method of “scrambling”
data before transmitting it onto thedata before transmitting it onto the
Internet.Internet.
Public Key Encryption TechniquePublic Key Encryption Technique
Digital signature – for authenticationDigital signature – for authentication
TunnelingTunneling
A virtual point-to-point connectionA virtual point-to-point connection
made through a public network. It transportsmade through a public network. It transports
encapsulated datagrams.encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Original Datagram
Data Encapsulation [From Comer]
Two types of end points:
 Remote Access
 Site-to-Site
Four Protocols used in VPNFour Protocols used in VPN
PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security
SOCKS – is not used as much as theSOCKS – is not used as much as the
ones aboveones above
Types of ImplementationsTypes of Implementations
What does “implementation” mean inWhat does “implementation” mean in
VPNs?VPNs?
3 types3 types
• Intranet – Within an organizationIntranet – Within an organization
• Extranet – Outside an organizationExtranet – Outside an organization
• Remote Access – Employee to BusinessRemote Access – Employee to Business
AdvantagesAdvantages
VS.VS.
DisadvantagesDisadvantages
Eliminating the need for expensive long-distanceEliminating the need for expensive long-distance
leased linesleased lines
Reducing the long-distance telephone chargesReducing the long-distance telephone charges
for remote access.for remote access.
Transferring the support burden to the serviceTransferring the support burden to the service
providersproviders
Operational costsOperational costs
Advantages: Cost SavingsAdvantages: Cost Savings
Flexibility of growthFlexibility of growth
Efficiency with broadband technologyEfficiency with broadband technology
Advantages: ScalabilityAdvantages: Scalability
VPNs require an in-depth understanding ofVPNs require an in-depth understanding of
public network security issues and properpublic network security issues and proper
deployment of precautionsdeployment of precautions
Availability and performance depends on factorsAvailability and performance depends on factors
largely outside of their controllargely outside of their control
Immature standardsImmature standards
VPNs need to accommodate protocols otherVPNs need to accommodate protocols other
than IP and existing internal network technologythan IP and existing internal network technology
DisadvantagesDisadvantages
ConclusionConclusion
It can be seen that creating and managing aIt can be seen that creating and managing a
VLAN can be quite a complex taskVLAN can be quite a complex task
The LAN administrator needs to have a clearThe LAN administrator needs to have a clear
understanding about how VLANs workunderstanding about how VLANs work
We must know the commands needed inWe must know the commands needed in
order to configure and set up the switches inorder to configure and set up the switches in
his network.his network.
www.wikipedia.orgwww.wikipedia.org
www.searchenterprisewan.techtarget.comwww.searchenterprisewan.techtarget.com
www.webopedia.orgwww.webopedia.org
www.technet.microsoft.comwww.technet.microsoft.com
REFERENCESREFERENCES

Mais conteúdo relacionado

Mais procurados (20)

Vpn
VpnVpn
Vpn
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Vpn
VpnVpn
Vpn
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 

Semelhante a VPNs Explained: Benefits and Drawbacks of Virtual Private Networks

Semelhante a VPNs Explained: Benefits and Drawbacks of Virtual Private Networks (20)

Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ism
IsmIsm
Ism
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Vpn
Vpn Vpn
Vpn
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
 
The vpn
The vpnThe vpn
The vpn
 

Mais de Ankit Anand

Mais de Ankit Anand (20)

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wtls
WtlsWtls
Wtls
 
Wap wml-6
Wap wml-6Wap wml-6
Wap wml-6
 
Data (1)
Data (1)Data (1)
Data (1)
 
Mc
McMc
Mc
 
Mc seminar
Mc seminarMc seminar
Mc seminar
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Middleware final
Middleware finalMiddleware final
Middleware final
 
Web services
Web servicesWeb services
Web services
 
Wap wml
Wap wmlWap wml
Wap wml
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
 
Guided media
Guided mediaGuided media
Guided media
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 

Último

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

VPNs Explained: Benefits and Drawbacks of Virtual Private Networks

  • 3. What is VPN?What is VPN? Virtual Private Network is a type of privateVirtual Private Network is a type of private network that uses public telecommunication,network that uses public telecommunication, such as the Internet, instead of leased lines tosuch as the Internet, instead of leased lines to communicate.communicate. Became popular as more employees worked inBecame popular as more employees worked in remote locations.remote locations. Terminologies to understand how VPNs work.Terminologies to understand how VPNs work.
  • 4. Private NetworksPrivate Networks vs.vs. Virtual Private NetworksVirtual Private Networks Employees can access the network (Intranet)Employees can access the network (Intranet) from remote locations.from remote locations. Secured networks.Secured networks. The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs Saves cost tremendously from reduction ofSaves cost tremendously from reduction of equipment and maintenance costs.equipment and maintenance costs. ScalabilityScalability
  • 5. Remote Access Virtual PrivateRemote Access Virtual Private NetworkNetwork
  • 6. Brief Overview of How it WorksBrief Overview of How it Works Two connections – one is made to theTwo connections – one is made to the Internet and the second is made to theInternet and the second is made to the VPN.VPN. Datagrams – contains data, destinationDatagrams – contains data, destination and source information.and source information. Firewalls – VPNs allow authorized usersFirewalls – VPNs allow authorized users to pass through the firewalls.to pass through the firewalls. Protocols – protocols create the VPNProtocols – protocols create the VPN tunnels.tunnels.
  • 7. Four Critical FunctionsFour Critical Functions AuthenticationAuthentication – validates that the data was– validates that the data was sent from the sender.sent from the sender. Access controlAccess control – limiting unauthorized users– limiting unauthorized users from accessing the network.from accessing the network. ConfidentialityConfidentiality – preventing the data to be– preventing the data to be read or copied as the data is beingread or copied as the data is being transported.transported. Data IntegrityData Integrity – ensuring that the data has– ensuring that the data has not been alterednot been altered
  • 8. EncryptionEncryption Encryption -- is a method of “scrambling”Encryption -- is a method of “scrambling” data before transmitting it onto thedata before transmitting it onto the Internet.Internet. Public Key Encryption TechniquePublic Key Encryption Technique Digital signature – for authenticationDigital signature – for authentication
  • 9. TunnelingTunneling A virtual point-to-point connectionA virtual point-to-point connection made through a public network. It transportsmade through a public network. It transports encapsulated datagrams.encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] Two types of end points:  Remote Access  Site-to-Site
  • 10. Four Protocols used in VPNFour Protocols used in VPN PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security SOCKS – is not used as much as theSOCKS – is not used as much as the ones aboveones above
  • 11. Types of ImplementationsTypes of Implementations What does “implementation” mean inWhat does “implementation” mean in VPNs?VPNs? 3 types3 types • Intranet – Within an organizationIntranet – Within an organization • Extranet – Outside an organizationExtranet – Outside an organization • Remote Access – Employee to BusinessRemote Access – Employee to Business
  • 13. Eliminating the need for expensive long-distanceEliminating the need for expensive long-distance leased linesleased lines Reducing the long-distance telephone chargesReducing the long-distance telephone charges for remote access.for remote access. Transferring the support burden to the serviceTransferring the support burden to the service providersproviders Operational costsOperational costs Advantages: Cost SavingsAdvantages: Cost Savings
  • 14. Flexibility of growthFlexibility of growth Efficiency with broadband technologyEfficiency with broadband technology Advantages: ScalabilityAdvantages: Scalability
  • 15. VPNs require an in-depth understanding ofVPNs require an in-depth understanding of public network security issues and properpublic network security issues and proper deployment of precautionsdeployment of precautions Availability and performance depends on factorsAvailability and performance depends on factors largely outside of their controllargely outside of their control Immature standardsImmature standards VPNs need to accommodate protocols otherVPNs need to accommodate protocols other than IP and existing internal network technologythan IP and existing internal network technology DisadvantagesDisadvantages
  • 16. ConclusionConclusion It can be seen that creating and managing aIt can be seen that creating and managing a VLAN can be quite a complex taskVLAN can be quite a complex task The LAN administrator needs to have a clearThe LAN administrator needs to have a clear understanding about how VLANs workunderstanding about how VLANs work We must know the commands needed inWe must know the commands needed in order to configure and set up the switches inorder to configure and set up the switches in his network.his network.