0% found this document useful (0 votes)
690 views15 pages

VPN

Virtual private networks (VPN) allow trusted networks to communicate securely over untrusted public networks like the Internet. VPNs use tunneling protocols to encapsulate and send private network traffic through the public network in an encrypted format. Common types of VPNs include remote access VPNs which allow individual users to connect remotely, and site-to-site VPNs that connect multiple office locations. While VPNs extend connectivity and improve security, they also present security concerns that must be addressed such as ensuring only authorized traffic passes through the encrypted tunnel and protecting against vulnerabilities in the public network.

Uploaded by

Chetan Singh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
690 views15 pages

VPN

Virtual private networks (VPN) allow trusted networks to communicate securely over untrusted public networks like the Internet. VPNs use tunneling protocols to encapsulate and send private network traffic through the public network in an encrypted format. Common types of VPNs include remote access VPNs which allow individual users to connect remotely, and site-to-site VPNs that connect multiple office locations. While VPNs extend connectivity and improve security, they also present security concerns that must be addressed such as ensuring only authorized traffic passes through the encrypted tunnel and protecting against vulnerabilities in the public network.

Uploaded by

Chetan Singh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 15

VIRTUAL PRIVATE NETWORKS (VPN)

UNIT 3

INDEX
2

WHAT IS VPN? Need Use of Tunneling with VPN Authentication Mechanisms Types of VPNs and their Usage Security Concerns in VPN

What is a VPN?
3

VPN is a network of virtual circuits that carries private traffic through public or shared networks such as the Internet or those provided by network service providers. VPN allows a trusted network to communicate with another trusted network over untrusted/ public networks like Internet. VPN are used to extend an enterprises internal private network across networks

What is a VPN?
4

Virtual Private Network (VPN) with tunneling over the Internet

Need/ Advantage
5

The need of VPN are as follows:


Extends

geographic connectivity Improves security Improves productivity Reduces transit time & transpiration costs Simplifies network topology Provides global networking opportunities Provides a broadband networking compatibility Provides a better ROI than a traditional WAN

Disadvantages
6

VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology

Tunneling
7

Tunneling is the process of placing an entire data packet within another packet (which provides the routing information) and sending it over the Internet. The path through which the packets travel is called a tunnel. For a tunnel to be established, both the tunnel client and the tunnel server must be using the same tunneling protocol A trusted VPN does not use cryptographic tunneling, instead it relies on the security of a

Tunneling
8

A virtual point-to-point connection made through a public network. It transports encapsulated datagrams.
Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area

Data Encapsulation [From Comer]

Two types of end points: Remote Access Site-to-Site

Example of packet encapsulation


9

Authentication Mechanism
10

A VPN involve two entities


Protected

network (inside an organization) Untrusted network (outside an organization)

A firewall sits remains between the remote users workstation and the server. As the client establish the communication with firewall, the client may pass authentication data to an authentication service inside the perimeter

Authentication Mechanism
11

For better security, VPN client can be configure to require that all the traffic must pass through the tunnel while VPN is active. Therefore, each employee would ensure that their data are kept safe and secure even if other computer in the network is infected

VPN Topology: Types of VPNs


12

Remote access VPN Site-to Site VPN


Intranet VPN Extranet VPN

13

VPN Topology: Remote Access VPN

VPN Topology: Site-to-Site VPN


14

Security Concern
15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy