Professional Documents
Culture Documents
Virtual Private Network: Team 15
Virtual Private Network: Team 15
Virtual Private Network: Team 15
VPN
VIRTUAL PRIVATE NETWORK
Presented by...
1) Prasanna Chandra M S
2) Sagar J
3) Sumanth M
CONTENTS
Introduction
VPN Types
VPN Protocols
Features
Real world application
Statistics/Case Study
Advantages & disadvantages
Conclusion
Quiz
INTRODUCTION
VPN stands for Virtual Private Network (VPN), that allows a user to
connect to a private network over the Internet securely and privately.
Virtual private network is one of the applications of IPSec.
VPN is a network that is private but virtual.
It is private because it guarantees privacy inside the organization.
It is virtual because it does not use real private WANs, the network is
physically public but virtually private.
What is VPN ?
A virtual private network(VPN) is a technology that is gaining popularity
among large organizations that use the global Internet for both intra- and
interorganization communication, but require privacy in their
intraorganization communication.
VPN creates an encrypted connection that is called VPN tunnel, and all
Internet traffic and communication is passed through this secure tunnel.
VPN Need & Use
Improve Internet privacy
Improve Online Security
Access Geo-Restricted content
Bypass internet restrictions
Prevent ISP tracking.
ARCHITECTURE OF VPN
A VPN is created by establishing a virtual point-to-point connection through
the use of dedicated circuits or with tunneling protocols over existing
networks. A VPN available from the public Internet can provide some of the
benefits of a wide area network (WAN).
Types Of VPN
1. Remote Access VPN
2. Site to Site VPN
Remote Access VPN
Remote Access VPN permits a user to connect to a private network and
access all its services and resources remotely.
The connection between the user and the private network occurs through
the Internet and the connection is secure and private.
Remote Access VPN is useful for both home and business users.
An employee of a company, while he is out of station, uses a VPN to connect
to his company’s private network and remotely access files and resources on
the private network. Private users or home users of VPN, primarily use VPN
services to bypass regional restrictions on the Internet and access
blocked websites. Users aware of Internet security also use VPN services to
enhance their Internet security and privacy.
A Remote Access VPN allows individual user to establish
secure connections with a remote computer network.
There are two components required in a Remote-access VPN.
1) NAS [Network Access Server]
2) Client software
Remote Access VPN
Site to Site VPN
A Site-to-Site VPN is also called as Router-to-Router VPN and is
commonly used in the large companies.
Companies or organizations, with branch offices in different locations, use
Site-to-site VPN to connect the network of one office location to the
network at another office location.
Basically, Site-to-site VPN create a imaginary bridge between the networks
at geographically distant offices and connect them through the Internet and
sustain a secure and private communication between the networks.
SITE TO SITE VPN
ADVANTAGE DISADVANTAGE
Bypass Geo-locked Content • Slow Connection Speeds
Provide Safety Through Anonymity • VPN Blocking Software Exists
Secure Connection for Remote Work • Complicated Set Up
Save Money on Region-Based • Dropped Connections
eCommerce
Cost-Effective Security
CONCLUSION
VPN is an emerging technology that comes a long way. From an
insecure break off of public telephone networks to a powerful business aid
that uses the internet as its gateway. VPN technology is still developing,
and its use is predicted to increase in upcoming years.
Let’s see how well you
understood!!!
QUIZ QUESTIONS
1. VPN is abbreviated as __________
a) Visual Private Network
b) Virtual Protocol Network
c) Virtual Private Network
d) Virtual Protocol Networking
2. __________ provides an isolated tunnel across a public network for sending and receiving data privately as
if the computing devices were directly connected to the private network.
a) Visual Private Network
b) Virtual Protocol Network
c) Virtual Protocol Networking
d) Virtual Private Network
5. VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public
network.
a) True
b) False