1. Presented By : SURENDRA BANE.
Class : T. E.
Roll No : 02
A.Y. : 2012-13
Under The Guidance Of : Prof. Prerna Shinde.
2. CONTENTS
Introduction
Traditional Connectivity
Why VPN is needed ?
Principle
How it works?
Tunneling
Four Protocols
Critical Function
VPN Technologies
Applications and Real-time example
Advantages and Disadvantages
Future
Conclusion
3. INTRODUCTION
What is VPN ?
Virtual Private Network is a type of private network
that uses public telecommunication, such as the
Internet, instead of leased lines to communicate.
Became popular as more employees worked in remote
locations.
Terminologies to understand how VPNs work.
5. VIRTUAL PRIVATE NETWORK
VS.
PRIVATE NETWORK
Employees can access the network
(Intranet) from remote locations.
Secured networks.
The Internet is used as the backbone for
VPNs
Saves cost tremendously from reduction of
equipment and maintenance costs.
6. PRINCIPLE
“A Virtual Private Network (VPN) is a
network constructed over the Internet and
other existing networks, that allows easy
and secure data transfers between the
participants.”
7. HOW IT WORKS ?
Two connections – one is made to the Internet and the
second is made to the VPN.
Datagrams – contains data, destination and source
information.
Firewalls – VPNs allow authorized users to pass through
the firewalls.
Protocols – protocols create the VPN tunnels.
10. FOUR PROTOCOLS IN VPN
PPTP -- Point-to-Point Tunneling Protocol.
L2TP -- Layer 2 Tunneling Protocol.
IPsec -- Internet Protocol Security.
SOCKS – is not used as much as the ones above
11. FOUR CRITICAL FUNCTION
Authentication – validates that the data was sent from
the authorized sender
Access control – give access to only authorized users.
Confidentiality – preventing the data to be read or
copied as the data is being transported.
Data Integrity – maintaining and assuring the accuracy
and consistency of data.
12. VPN TECHNOLOGIES
1 : Trusted VPN
Provide assurance of properties of paths such as QoS.
No security.
2 : Secure VPN
Provide Security.
No assurance of paths.
3 : Hybrid VPN
Provide Secure and Trusted VPNs.
Company already have Trusted VPN and need Security.
13. APPLICATION : REMOTE ACCESS
Secure connection – own computer to VPN router.
Easily access email, data, files at work from
outside through Internet.
VPN allows mobile workers & telecommuters to
take advantage of broadband connectivity.
15. APPLICATION : SITE-TO-SITE
Data is encrypted from one VPN gateway to other
by secure link between two sites over internet.
This would enable both sites to share resources –
documents, other data over VPN link.
This saves the company hardware and
management expenses.
19. ADVANTEGES
Eliminating the need for expensive long-
distance leased lines
Reducing the long-distance telephone
charges for remote access.
data integrity and privacy is achieved.
Reduced Operational costs.
Flexibility of growth .
20. DISADVANTAGES
VPNs require an in-depth understanding of
public network, security issues and proper
deployment of precautions.
VPNs need to accommodate protocols other
than IP and existing internal network
technology.
21. Where Do We See VPNs Going in
the Future?
As the VPN market becomes larger, more applications
will be created along with more VPN providers and new
VPN types.
Networks are expected to converge to create an
integrated VPN.
Improvement of protocols are expected, which will also
improve VPNs.
22. CONCLUSION
VPNs allow users to connect to remote
servers, branch offices, or to other
companies over a public
internetwork, while maintaining secure
communications.
A VPN, only requires a broadband
internet connection