Virtual Private Network: Team 15

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

Team 15

VPN
 VIRTUAL PRIVATE NETWORK
Presented by...
        1) Prasanna Chandra M S
        2) Sagar J
        3) Sumanth M 
CONTENTS
 Introduction
 VPN Types
 VPN Protocols
 Features
 Real world application
 Statistics/Case Study
 Advantages & disadvantages
 Conclusion
 Quiz
INTRODUCTION
VPN stands for Virtual Private Network (VPN), that allows a user to
connect to a private network over the Internet securely and privately.
Virtual private network is one of the applications of IPSec.
VPN is a network that is private but virtual. 
It is private because it guarantees privacy inside the organization. 
It is virtual because it does not use real private WANs, the network is
physically public but virtually private.
What is VPN ?
A virtual private network(VPN) is a technology that is gaining popularity
among large organizations that use the global Internet for both intra- and
interorganization communication, but require privacy in their
intraorganization communication. 
VPN creates an encrypted connection that is called VPN tunnel, and all
Internet traffic and communication is passed through this secure tunnel.
 VPN Need & Use 
Improve Internet privacy
Improve Online Security
Access Geo-Restricted content
Bypass internet restrictions
Prevent ISP tracking.
ARCHITECTURE OF VPN
A VPN is created by establishing a virtual point-to-point connection through
the use of dedicated circuits or with tunneling protocols over existing
networks. A VPN available from the public Internet can provide some of the
benefits of a wide area network (WAN).
Types Of VPN
1. Remote Access VPN
2. Site to Site VPN
Remote Access VPN
 Remote Access VPN permits a user to connect to a private network and
access all its services and resources remotely.
 The connection between the user and the private network occurs through
the Internet and the connection is secure and private. 
 Remote Access VPN is useful for both home and business users.
An employee of a company, while he is out of station, uses a VPN to connect
to his company’s private network and remotely access files and resources on
the private network. Private users or home users of VPN, primarily use VPN
services to bypass regional restrictions on the Internet and access
blocked websites. Users aware of Internet security also use VPN services to
enhance their Internet security and privacy.
A Remote Access VPN allows individual user to establish
secure connections with a remote computer network.
There are two components required in a Remote-access VPN.
      1) NAS [Network Access Server]
        2) Client software
Remote Access VPN
Site to Site VPN
 A Site-to-Site VPN is also called as Router-to-Router VPN and is
commonly used in the large companies.
 Companies or organizations, with branch offices in different locations, use
Site-to-site VPN to connect the network of one office location to the
network at another office location.
 Basically, Site-to-site VPN create a imaginary bridge between the networks
at geographically distant offices and connect them through the Internet and
sustain a secure and private communication between the networks. 
SITE TO SITE VPN

In Site-to-site VPN one router


acts as a VPN Client and
another router as a VPN
Server. As it is based on
Router-to-Router
communication. When the
authentication is validated
between the two routers only
then the communication starts.
Types Of Site To Site VPN
1. Intranet Based VPN
2. Extranet Based VPN
Intranet Based VPN

When several offices of the same company


are connected using Site-to-Site VPN type,
it is called as Intranet based VPN.
Extranet Based VPN

When companies use Site-to-site VPN type


to connect to the office of another
company, it is called as Extranet based
VPN.
Types of VPN Protocols
-
SSL and
IPSec
TLS
L2TP OpenVPN
PPTP SSH
 Internet Protocol Security (IPSec): It is used to secure Internet communication across an IP network. IPSec
secures Internet Protocol communication by verifying the session and encrypts each data packet during the
connection.
 Layer 2 Tunneling Protocol (L2TP): It is a tunneling protocol that is often combined with another VPN
security protocol like IPSec to establish a highly secure VPN connection. L2TP generates a tunnel between two
L2TP connection points and IPSec protocol encrypts the data and maintains secure communication between the
tunnel.
 Point–to–Point Tunneling Protocol (PPTP): It will generate a tunnel and confines the data packet. Point-to-
Point Protocol (PPP) is used to encrypt the data between the connection. PPTP is one of the most widely used
VPN protocol and has been in use since the early release of Windows. PPTP is also used on Mac and Linux
apart from Windows.
 SSL and TLS: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) generate a VPN connection
where the web browser acts as the client and user access is prohibited to specific applications instead of entire
network. 
 OpenVPN: It is an open source VPN that is commonly used for creating Point-to-Point and Site-to-Site
connections. It uses a traditional security protocol based on SSL and TLS protocol.
 Secure Shell (SSH): It generates the VPN tunnel through which the data transfer occurs and also ensures that
the tunnel is encrypted. SSH connections are generated by a SSH client and data is transferred from a local port
on to the remote server through the encrypted tunnel.
FEATURES
Plentiful server locations
Mobile apps
Integrated kill switch
Anonymous DNS servers
No log policy
Router support
Support for OpenVPN
 Low price
Real world applications of VPN
Circumvent geographical restrictions with VPN
Ensure Blockchain and Bitcoin mining are totally secure
Protect access to public Wi-Fi hotspots
Avoid ISP and website user tracking
Overcome Internet censorship
Prepare system to secure file downloading
Enable users to access a Business/Home Network while travelling
VPN Statistics/Case Study
As technological advancements continue to evolve at lightning speed,
security and privacy become compromised just as quickly.
The VPN industry is worth $31.1 billion.
31% (i.e.,One-third) of all internet users use VPN services.
68% of adults in the US use VPNs.
Indonesia has the highest percentage of VPN users in the world
39% of VPN users are Gen Z.
Statistics of VPN (Pie-Chart)
Advantages & Disadvantages

ADVANTAGE DISADVANTAGE
 Bypass Geo-locked Content • Slow Connection Speeds
 Provide Safety Through Anonymity • VPN Blocking Software Exists
 Secure Connection for Remote Work • Complicated Set Up
 Save Money on Region-Based • Dropped Connections
eCommerce
 Cost-Effective Security
CONCLUSION
 VPN is an emerging technology that comes a long way. From an
insecure break off of public telephone networks to a powerful business aid
that uses the internet as its gateway. VPN technology is still developing,
and its use is predicted to increase in upcoming years.
Let’s see how well you
understood!!!
QUIZ QUESTIONS
1. VPN is abbreviated as __________ 
a) Visual Private Network 
b) Virtual Protocol Network 
c) Virtual Private Network 
d) Virtual Protocol Networking 
 
2. __________ provides an isolated tunnel across a public network for sending and receiving data privately as
if the computing devices were directly connected to the private network. 
a) Visual Private Network 
b) Virtual Protocol Network 
c) Virtual Protocol Networking 
d) Virtual Private Network

3. Which of the statements are not true to classify VPN systems? 


a) Protocols used for tunnelling the traffic 
b) Whether VPNs are providing site-to-site or remote access connection 
c) Securing the network from bots and malwares 
d) Levels of security provided for sending and receiving data privately 
 
4. What types of protocols are used in VPNs? 
a) Application level protocols 
b) Tunnelling protocols 
c) Network protocols 
d) Mailing protocols 

5. VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public
network. 
a) True 
b) False 

6. There are _________ types of VPNs. 


a) 3 
b) 2 
c) 5 
d) 4 

7. Site-to-site VPNs are also known as ________ 


a) Switch-to-switch VPNs 
b) Peer-to-Peer VPNs 
c) Point-to-point VPNs 
d) Router-to-router VPNs 
8. _________ type of VPNs are used for home private and secure connectivity. 
a) Remote access VPNs 
b) Site-to-site VPNs 
c) Peer-to-Peer VPNs 
d) Router-to-router VPNs 
 
9. Which types of VPNs are used for corporate connectivity across companies residing in different geographical
location? 
a) Remote access VPNs 
b) Site-to-site VPNs 
c) Peer-to-Peer VPNs 
d) Country-to-country VPNs 

10. Site-to-Site VPN architecture is also known as _________ 


a) Remote connection based VPNs 
b) Peer-to-Peer VPNs 
c) Extranet based VPN 
d) Country-to-country VPNs 
11. A ______ can hide a user’s browsing activity. 
a) Firewall 
b) Antivirus 
c) Incognito mode 
d) VPN 
 
12. __________ masks your IP address. 
a) Firewall 
b) Antivirus 
c) VPN 
d) Incognito mode 
 
13. _________ are also used for hides user’s physical location. 
a) Firewall 
b) Antivirus 
c) Incognito mode 
d) VPN 
14. Using VPN, we can access _______________ 
a) Access sites that are blocked geographically 
b) Compromise other’s system remotely 
c) Hide our personal data in the cloud 
d) Encrypts our local drive files while transferring 

15. IPSec stands for _____________________


a) Internet Protocol Security
b) Intranet Protocol Security
c) Internet Protocol Security
Thank You

You might also like