SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
www.oeclib.in
Submitted By:
Odisha Electronic Control Library
Seminar
On
Virtual Private Networks
(VPN)
Content
 What is VPN
 Types of VPN’s
 How does it work?
 Protocols
 Security: Firewalls
 VPN Devices
 Advantages
 Disadvantages
 Features
 Future
 Conclusion
What is VPN
 Virtual Private Network is a
type of private network that
uses public telecommunication,
such as the Internet, instead of
leased lines to communicate.
 Became popular as more
employees worked in remote
locations.
 Terminologies to understand
how VPNs work.
Types of VPN’s
 Remote-Access VPN
 Site-to-Site VPN (Intranet-based)
 Site-to-Site VPN (Extranet-based)
Remote-Access VPN
 A remote access VPN is for home or travelling
users who need to access their central LAN from a
remote location.
 They dial their ISP and connect over the internet
to the LAN.
 This is made possible by installing a client software
program on the remote user’s laptop or PC that
deals with the encryption and decryption of the
VPN traffic between itself and the VPN gateway on
the central LAN.
Site-to-Site VPN
 Intranet-based - If a company has one or more
remote locations that they wish to join in a single
private network, they can create an intranet VPN
to connect LAN to LAN.
 Extranet-based - When a company has a close
relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that
allows all of the various companies to work in a
shared environment.
All 3 types of VPN
Protocols used in VPN
 PPTP - Point-to-point tunneling protocol
 L2Tp – Layers to Tunneling Protocol
 IPSec - Internet protocol security
 SSL – is not used as much as the ones above.
 Encryption
VPN Security: Firewall
A well-designed VPN uses several methods for keeping
your connection and data secure:
 Firewalls
 Encryption
 IPSec
 AAA Server
 You can set firewalls to restrict the number of open
ports, what type of packets are passed through and
which protocols are allowed through.
VPN Devices
 Hardware
 Firewall
 Software
VPN Advantages
 Multiple telephone lines and banks of modems at the
central site are not required.
 A reduction in the overall telecommunication
infrastructure – as the ISP provides the bulk of the
network.
 Reduced cost of management, maintenance of
equipment and technical support.
 Simplifies network topology by eliminating modem
pools and a private network infrastructure.
 VPN functionality is already present in some IT
equipment.
VPN Disadvantage
 If the ISP or Internet connection is down, so is the
VPN.
 The central site must have a permanent internet
connection so that remote clients and other sites can
connect at anytime.
 VPNs may provide each user with less bandwidth than
a dedicated line solution.
 Existing firewalls, proxies, routers and hubs may not
support VPN transmissions.
VPN Features
 Security – tunneling support between sites with at
least 128bit encryption of the data.
 Scalability – extra users and bandwidth can be added
easily to adapt to new requirements.
 Services – quality of service features, including
bandwidth, management and traffic shaping, are
important to avoid congestion.
 Management – reports on user activity, management
of user policies and monitoring of the VPN as a whole.
Future of VPN
 VPN popularity
 Companies choosing VPN
 Cost efficient?
 New way of communicating?
Future of VPN: Companies with
VPN
Conclusion
 As we have gone through all possible details we
conclude that VPN is the best option for the corporate
networking.
 As many companies need to have access to Internet
and hence security is also the main concern.
 VPN provides best possible combination of security
and private network capabilities with adequate cost –
saving to the companies who are presently working
with leased lines.
References
 www.studymafia.org
 www.google.com
THANKS

Mais conteúdo relacionado

Semelhante a csevpnppt-170905123948 (1).pdf

VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
shabdrang
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
ssusera07323
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 

Semelhante a csevpnppt-170905123948 (1).pdf (20)

VPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.pptVPN_basics_and_necssitated_Technologies.ppt
VPN_basics_and_necssitated_Technologies.ppt
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Vpn
VpnVpn
Vpn
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 

Mais de HirazNor (14)

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptx
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptx
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptx
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptx
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
IAP PPT-2.pptx
IAP PPT-2.pptxIAP PPT-2.pptx
IAP PPT-2.pptx
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.ppt
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptx
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptx
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

csevpnppt-170905123948 (1).pdf

  • 1. www.oeclib.in Submitted By: Odisha Electronic Control Library Seminar On Virtual Private Networks (VPN)
  • 2. Content  What is VPN  Types of VPN’s  How does it work?  Protocols  Security: Firewalls  VPN Devices  Advantages  Disadvantages  Features  Future  Conclusion
  • 3. What is VPN  Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  Became popular as more employees worked in remote locations.  Terminologies to understand how VPNs work.
  • 4. Types of VPN’s  Remote-Access VPN  Site-to-Site VPN (Intranet-based)  Site-to-Site VPN (Extranet-based)
  • 5. Remote-Access VPN  A remote access VPN is for home or travelling users who need to access their central LAN from a remote location.  They dial their ISP and connect over the internet to the LAN.  This is made possible by installing a client software program on the remote user’s laptop or PC that deals with the encryption and decryption of the VPN traffic between itself and the VPN gateway on the central LAN.
  • 6. Site-to-Site VPN  Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.  Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
  • 7. All 3 types of VPN
  • 8.
  • 9. Protocols used in VPN  PPTP - Point-to-point tunneling protocol  L2Tp – Layers to Tunneling Protocol  IPSec - Internet protocol security  SSL – is not used as much as the ones above.  Encryption
  • 10. VPN Security: Firewall A well-designed VPN uses several methods for keeping your connection and data secure:  Firewalls  Encryption  IPSec  AAA Server  You can set firewalls to restrict the number of open ports, what type of packets are passed through and which protocols are allowed through.
  • 11. VPN Devices  Hardware  Firewall  Software
  • 12. VPN Advantages  Multiple telephone lines and banks of modems at the central site are not required.  A reduction in the overall telecommunication infrastructure – as the ISP provides the bulk of the network.  Reduced cost of management, maintenance of equipment and technical support.  Simplifies network topology by eliminating modem pools and a private network infrastructure.  VPN functionality is already present in some IT equipment.
  • 13. VPN Disadvantage  If the ISP or Internet connection is down, so is the VPN.  The central site must have a permanent internet connection so that remote clients and other sites can connect at anytime.  VPNs may provide each user with less bandwidth than a dedicated line solution.  Existing firewalls, proxies, routers and hubs may not support VPN transmissions.
  • 14. VPN Features  Security – tunneling support between sites with at least 128bit encryption of the data.  Scalability – extra users and bandwidth can be added easily to adapt to new requirements.  Services – quality of service features, including bandwidth, management and traffic shaping, are important to avoid congestion.  Management – reports on user activity, management of user policies and monitoring of the VPN as a whole.
  • 15. Future of VPN  VPN popularity  Companies choosing VPN  Cost efficient?  New way of communicating?
  • 16. Future of VPN: Companies with VPN
  • 17. Conclusion  As we have gone through all possible details we conclude that VPN is the best option for the corporate networking.  As many companies need to have access to Internet and hence security is also the main concern.  VPN provides best possible combination of security and private network capabilities with adequate cost – saving to the companies who are presently working with leased lines.