Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

WHAT IS VPN ?

 VPN stands for Virtual Private Network


 A private network that uses a public network
(usually the Internet) to connect remote sites.
 It’s a form of Wide Area Network
CONT...
History of VPN

 Earlier Leased Lines such as ISDN were


used for Wide Area Networks(WAN)

 Then came INTRANET

 VPN came to be used to accommodate the


needs of remote offices
HOW VPN WORKS ...
How VPN Works
Tunneling

 Virtual private network technology is based on the idea


of tunneling.
 VPN tunneling involves establishing and maintaining a
logical network connection.
 On this connection, packets constructed in a specific VPN
protocol format are encapsulated within some other
base or carrier protocol, then transmitted between VPN
client and server, and finally de-encapsulated on the
receiving side.
 VPN protocols also support authentication and
encryption to keep the tunnels secure
Tunneling

The truck is the carrier protocol, the box is the encapsulating protocol and the
computer is the passenger protocol.
Types of VPN

VIRTUAL PRIVATE NETWORK POINT-TO-POINT

SITE-TO-SITE

VIRTUAL PRIVATE DIAL-UP


INTRANET BASED NETWORK(VPDN)
EXTRANET BASED
Virtual Private Dial-Up Network

 Also known as Remote Access


 Is a User to LAN connection used by a company
 Software based VPN System which uses existing Internet
connection.
 Uses encryption methods to send out the data.
 Cheaper version of VPN.
Site-to-Site VPN
 Two types-Intranet based & Extranet based

 Intranet based -For one or more remote locations


 Intranet VPN connects LAN to LAN

 Extranet based -For partner companies


 Allows existence of shared environment
Point to Point VPN

 These are also called Leased line VPN.


 Direct point to point connection.
 Very much expensive.
Diagrammatic Representation:
VPN SECURITY

ENCRYPTION

IP SEC

VPN
SECURITY

FIREWALLS
VPN SECURITY: FIREWALLS

 Provides a strong barrier between private network and internet

 Used for restricting open ports,type of packets passed through &


protocols allowed

 Good firewall essential before installing VPN

 Firewalls used for terminating VPN sessions


VPN SECURITY : IPSec
ABOUT IPSec :

 Provides better security features

 Encryption Algorithms & More comprehensive authentication are added


features

 Two encryption modes: Tunnel & Transport

 Tunnel: Encrypts header and payload of each packet

 Transport: Encrypts only payload

 Devices must use a common key and firewalls of each network must have
similar security policies
VPN SECURITY:ENCRYPTION :

 Process in which data taken from one computer is encoded into a


form readable by destination computer only
 Classified in two types:

ENCRYPTION
SYYMETRIC KEY PUBLIC KEY
SYMMETRIC KEY ENCRYPTION :

 Each computer has a secret code that is used to encrypt a packet of


information

 Code is then transmitted to the other computer

 Key requirement is to know which computers will be talking to each


other

 Code provides the method of decoding the message


PUBLIC KEY ENCRYPTION :

 Combination of Private key and Public key

 Private key is known only to host computer

 Public key is given by host computer to any computer with which it


wants to securely connect

 For decoding the message public key is required along with the
receiver`s own private key.
BUSINESS PROSPECTIVE

 IT Industry
 Hotels
 Banking
 ERP(Enterprise resource planning)
APPLICATIONS

 B2B-Business-to-business applications with customers,


suppliers and partners
 VoIP for enterprises looking for converged services
rather than having a separate PSTN-Public switched
telephone network.
 Teleworkers who work from outside the office premises.
 Wireless VPN
 Storage Area Networks setup by large corporations
 EAI - Enterprise Application Integration for web based
CRM
Advantages of VPN
 Eliminating the need for expensive long-distance leased lines
 Reducing long-distance telephone charges
 Offloading support costs
 Extend geographic connectivity
 Improve security
 Reduce operational costs versus traditional WAN
 Reduce transit time and transportation costs for remote users
 Improve productivity
 Simplify network topology
 Provide global networking opportunities
 Provide telecommuter support
 Provide broadband networking compatibility
 Provide faster ROI (return on investment) than traditional WAN
Limitations of VPN

1. VPNs require detailed understanding of network


security issues.
2. It needs careful installation / configuration to ensure
sufficient protection on a public network like the Internet.

3. The reliability and performance of an Internet-based


VPN is not under an organization's direct control.

4. VPN products and solutions from different vendors


have not been compatible, hence creating complexities.
FUTURE ...

 VPN is the answer to WAN – cost effective


solution to private leased lines.
VPN is more trusted than the internet.
CONCLUSION

 Efficient tool in transferring data


 Best way to connect remote areas
 Secured networking provided for the users
 Very cost effective
REFERENCES
ANY QUERY?
ANY DOUBT?

You might also like