100% found this document useful (1 vote)
2K views19 pages

Virtual Private Networks (VPN) : Seminar On

This document summarizes a seminar presentation on virtual private networks (VPN). It defines a VPN as using public networks like the Internet to connect private networks securely through virtual tunnels. There are three main types of VPNs: remote-access VPNs for individual users, intranet site-to-site VPNs connecting company locations, and extranet site-to-site VPNs for partner organizations. Common VPN protocols discussed include IPSec, PPTP, and L2TP. The document outlines VPN security methods, advantages like reduced costs, and disadvantages such as relying on internet connectivity. It concludes that VPNs provide a cost-effective combination of security and private networking capabilities for many companies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views19 pages

Virtual Private Networks (VPN) : Seminar On

This document summarizes a seminar presentation on virtual private networks (VPN). It defines a VPN as using public networks like the Internet to connect private networks securely through virtual tunnels. There are three main types of VPNs: remote-access VPNs for individual users, intranet site-to-site VPNs connecting company locations, and extranet site-to-site VPNs for partner organizations. Common VPN protocols discussed include IPSec, PPTP, and L2TP. The document outlines VPN security methods, advantages like reduced costs, and disadvantages such as relying on internet connectivity. It concludes that VPNs provide a cost-effective combination of security and private networking capabilities for many companies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Seminar

On
Virtual Private Networks (VPN)

Submitted By: KHATAL RAHUL BABASAHEB


Submitted To:
Mr. S. Mahajan Mr. B. B. Vikhe Dr. M.R. Bendre
Seminar Guide, Seminar Coordinator, HOD,
Dept. of Computer Engg. Dept. of Computer Engg. Dept. of Computer Engg
Content
• ABSTRACT
• INTRODUCTION
• WHAT IS VPN
• TYPES OF VPN’S
• HOW DOES IT WORK?
• PROTOCOLS
• SECURITY: FIREWALLS
• ADVANTAGES
• DISADVANTAGES
• ARCHITECTURE
• CONCLUSION
• REFERENCES
ABSTRACT

• Virtual Private Network (VPN) is rapidly growing technology which plays


a great role in Wireless LAN (WLAN) by providing secure data
transmission.
• The purpose of VPN is to provide safe and secure communication by
creating virtual tunnels between pair of hosts, once tunnel is created data
transfer can take place
• This paper presents a comprehensive study of VPN- IPSec and SSL VPN,
architecture and protocols used The salient of this paper to present
comparison analysis of both technologies IPSec and SSL VPN together
with their advantages and disadvantages.
INTRODUCTION
• Virtual. Virtual means not real or in a different state of being. In a VPN,
private communication between two or more devices is achieved through a
public network the Internet. Therefore, the communication is virtually but
not physically there.
• Private. Private means to keep something a secret from the general public.
Although those two devices are communicating with each other in a public
environment, there is no third party who can interrupt this communication
or receive any data that is exchanged between them.
• Network. A network consists of two or more devices that can freely and
electronically communicate with each other via cables and wire. A VPN is
a network. It can transmit information over long distances effectively and
efficiently.
WHAT IS VPN
•Virtual Private Network is a type
of private network that uses public
telecommunication, such as the
Internet, instead of leased lines to
communicate.

•Became popular as more


employees worked in remote
locations.

•Terminologies to understand how


VPNs work.
TYPES OF VPN’S
• Remote-Access VPN

• Site-to-Site VPN (Intranet-based)

• Site-to-Site VPN (Extranet-based)


Remote-Access VPN
• A remote access VPN is for home or travelling
users who need to access their central LAN from a
remote location.
• They dial their ISP and connect over the internet
to the LAN.
• This is made possible by installing a client software
program on the remote user’s laptop or PC that
deals with the encryption and decryption of the
VPN traffic between itself and the VPN gateway on
the central LAN.
Site-to-Site VPN
• Intranet-based - If a company has one or more
remote locations that they wish to join in a single
private network, they can create an intranet VPN to
connect LAN to LAN.
• Extranet-based - When a company has a close
relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that
allows all of the various companies to work in a
shared environment.
All 3 types of VPN
PROTOCOLS USED IN VPN
• PPTP - Point-to-point tunneling protocol
• L2Tp – Layers to Tunneling Protocol
• IPSec - Internet protocol security
• SSL – is not used as much as the ones above.
• Encryption
VPN SECURITY: FIREWALL
• A well-designed VPN uses several methods for keeping
your connection and data secure:
• Firewalls
• Encryption
• IPSec
• AAA Server

• You can set firewalls to restrict the number of open


ports, what type of packets are passed through and
which protocols are allowed through.
VPN ADVANTAGES
• Multiple telephone lines and banks of modems at the
central site are not required.
•  A reduction in the overall telecommunication
infrastructure – as the ISP provides the bulk of the
network.
•  Reduced cost of management, maintenance of equipment
and technical support.
•  Simplifies network topology by eliminating modem pools
and a private network infrastructure.
•  VPN functionality is already present in some IT
equipment.
VPN DISADVANTAGE
• If the ISP or Internet connection is down, so is the
VPN.
•  The central site must have a permanent internet
connection so that remote clients and other sites can
connect at anytime.
• VPNs may provide each user with less bandwidth than
a dedicated line solution.
•  Existing firewalls, proxies, routers and hubs may not
support VPN transmissions.
VPN FEATURES
• Security – tunneling support between sites with at
least 128bit encryption of the data.
• Scalability – extra users and bandwidth can be added
easily to adapt to new requirements.
• Services – quality of service features, including
bandwidth, management and traffic shaping, are
important to avoid congestion.
•  Management – reports on user activity, management
of user policies and monitoring of the VPN as a whole.
ARCHITECTURE
CONCLUSION
• As we have gone through all possible details we
conclude that VPN is the best option for the corporate
networking.
• As many companies need to have access to Internet
and hence security is also the main concern.
• VPN provides best possible combination of security
and private network capabilities with adequate cost –
saving to the companies who are presently working
with leased lines.
REFERENCES
• https://ieeexplore.ieee.org/document/9418865
• www.google.com
• www.wikipedia.com
• Baukari N., and Ali Aljane, Security and auditing of VPN. In sdne, IEEE, 1996,
132. 
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy