SlideShare a Scribd company logo
6
Most read
18
Most read
20
Most read
VPN
VIRTUAL PRIVATE NETWORK
VIRTUAL PRIVATE
NETWORK
It basically encrypts the connection and makes
the user’s IP address hidden by using various tunneling
protocols.
It is used to bypass geo-blocks and for security
purposes. It is secure and private means for file sharing,
communication and remotely accessing data without
any risk of a hack.
VPN tunneling ensures encryption
at the user’s end and decryption at
the receiver’s end, for this to
happen the device should be
connected to a VPN client software
application.VPN acts as an
intermediator between user and
connection to the internet. It hides
user IP address and makes a
connection from VPN’s private
network rather than the user’s ISP
HISTORY OF VPN
1996 - a Microsoft’s employee started to work on Peer-to-
Peer Tunneling Protocol
1999 - First VPN was published
FEATURES
VPN PROVIDES PLENTIFUL SERVER
LOCATION.
IT ALSO PROVIDES ANONYMOUS DNS
SERVERS.
VPNS ARE GENERALLY COST-EFFECTIVE.
VPN SUPPORTS ROUTER.
THE VPN IS HIGHLY ENCRYPTED AND
SECURE.
ALONG WITH VPN, WE GET SECURE VPN
PROTOCOLS.
IT PROVIDES SAFETY AGAINST DNS LEAK.
THE VPN PROVIDERS ALSO OFFER CROSS-
PLATFORM COMPATIBLE APPS.
It maintains confidentiality of user’s data.
It maintains the integrity of the user’s
data that is the data cannot be changed
in between the transmission.
It ensures non-repudiation that is a
sender cannot deny that he/she had not
sent the data.
Data authentication is also ensured by
VPN, it verifies the source and
destination’s authenticity.
Characteristics of VPN
APPLICATION
OF VPN
VPN can easily bypass geographic restrictions on
websites or streaming audio and video.
Using a VPN, we can protect ourselves from
snooping from untrustworthy Wi-Fi hotspots.
One can gain privacy online by hiding one’s true
location.
One can protect themselves from being logged
while torrenting.
VPN Protocol
IP Security (IPsec)
Point-to-Point Tunneling Protocol (PPTP)
Secure Sockets Layer (SSL) and Transport Layer
Security (TLS)
Layer 2 Tunnel Protocol (L2TP)
OpenVPN
It ensure an appropriate level of security with connected
systems when the underlying network infrastructure can
not provide it alone. To secure and encrypt, several
different protocols can be used:
WORKING PRINCIPLE OF VPN
The working principle of a VPN involves creating
a secure and encrypted connection between the
user’s device and a VPN server. This connection
is created using a combination of encryption
protocols and network protocols.
When a user connects to a VPN, their device
sends a request to the VPN server to establish a
secure connection. The VPN server responds by
sending the user’s device a set of encryption
keys, which are used to encrypt all data that is
transmitted between the device and the VPN
server.
WORKING PRINCIPLE OF VPN
Once the connection has been established, all
data that is transmitted between the user’s
device and the VPN server is encrypted using the
encryption keys. This means that even if a
hacker intercepts the data, they will not be able
to read it.
VPN also uses network protocols to ensure that
the data is transmitted securely. The most
common network protocol used by VPNs is the
Internet Protocol Security (IPsec) protocol. IPsec
provides a set of security protocols that ensure
the integrity, confidentiality, and authenticity of
the data that is transmitted over the internet.
Advantages of VPN
Improved Security: A VPN encrypts all data that is
transmitted between the user’s device and the
VPN server. This means that even if a hacker
intercepts the data, they will not be able to read
it.
Privacy: A VPN masks the user’s IP address,
making it difficult for websites and online services
to track their online activity.
Access to Restricted Content: Some websites and
online services are restricted in certain countries.
By using a VPN, users can connect to a server in
another country and access the content that is
restricted in their own country.
Anonymity: By masking the user’s IP address and
encrypting their data, a VPN provides a high level
of anonymity online.
Disadvantages of VPN
The time taken to fetch the data sometimes
increases when fetched through VPN, so there
might be a performance issue with respect to
time.
VPN allows you to hide your identity but
sometimes your VPN provider company itself
steals your data, which can cause security issues.
Whenever VPN disconnection occurs
there is a possibility of IP address get
revealed to the network from which
connection was made.
It is always not possible to bypass
restrictions applied by a website by using
a VPN.
1
3
Site-to-Site
VPN
2
Remote Access VPN
Client-to-Site
VPN
TYPES OF VPN
VPN
PRIVACY
YOUR BROWSING HISTORY
YOUR LOCATION FOR
STREAMING
YOUR IP ADDRESS AND
LOCATION
YOUR DEVICES
YOUR WEB ACTIVITY — TO
MAINTAIN INTERNET FREEDOM
1.
2.
3.
4.
5.
TYPES OF VPN
TUNNELING
VOLUNTARY
TUNNELING
COMPULSORY
TUNNELING
Tunneling is the technique of putting an integrated data packet into another packet
(which contains routing information) and sending it over the internet. The packets
travel through a path which is known as tunnel. To secure a tunneled transmission
against interception, all traffic over a VPN is encrypted for safety.
VOLUNTARY COMPULSORY
VOLUNTARY VS COMPULSORY
VPN client in the
voluntary tunneling
handles all the
connection setup.
Two step
procedure is
required to set up
the VPN
connection in
voluntary tunneling.
the client first establish a
normal connection to the
carrier then the carrier works
as an intermediary to make a
connection between a VPN
server and that client.
Compulsory tunneling
provides complete
management control of the
tunnels to the ISP and hides
the details of the
connectivity of VPN server
from the clients.
VPN FRONT END PROCESSOR (FEP)
NETWORK ACCESS SERVER (NAS)
POINT OF PRESENCE SERVER (POS)
BROKER DEVICES ARE USED IN COMPULSORY
TUNNELING FOR THE VERIFICATION OF CLIENTS. THE
LOGIC BUILD IN THE BROKER DEVICE ARE USED TO
ASSOCIATES THE CLIENT WITH THE DIFFERENT VPN
SERVERS.
THIS NETWORK DEVICE IS ALSO CALLED AS THE
FOLLOWING:
ACTIVITY
We will try to setup a VPN connection using
Hamachi VPN

More Related Content

PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
PPTX
Virtual private network(vpn)
PDF
Vpn security
PPTX
Presentation on VPN
PPTX
Virtual Private Network
PPTX
Vpn-Virtual Private Network
PDF
Virtual private network chapter 1 PSU.pdf
PDF
VPN (virtual private network)
VPN, Its Types,VPN Protocols,Configuration and Benefits
Virtual private network(vpn)
Vpn security
Presentation on VPN
Virtual Private Network
Vpn-Virtual Private Network
Virtual private network chapter 1 PSU.pdf
VPN (virtual private network)

Similar to Introduction to Virtual Private Network and Components (20)

PDF
PPTX
VPN Virtual Private Network,he first VPN protocols, such as PPTP
PPTX
IIT INDOR VPN AND NETWORK Security Control.pptx
PPT
Virtual private networks by darshana viduranga
PDF
A depth detail about vpn security
PPTX
Mobile vpn(Private and secure network). Mobile computing
PPTX
Virtual Private Network(VPN)
PPTX
VPN.pptx
DOC
Virtual private network
PPTX
Presentation vpn
PPT
Vpn networks kami
PPTX
Virtual Private Network
PDF
VPN - Virtual Private Network
PPT
Virtual private network feature and benefits
PPT
Vpn presentation
PPT
Shradhamaheshwari vpn
PPTX
VPN In Details
VPN Virtual Private Network,he first VPN protocols, such as PPTP
IIT INDOR VPN AND NETWORK Security Control.pptx
Virtual private networks by darshana viduranga
A depth detail about vpn security
Mobile vpn(Private and secure network). Mobile computing
Virtual Private Network(VPN)
VPN.pptx
Virtual private network
Presentation vpn
Vpn networks kami
Virtual Private Network
VPN - Virtual Private Network
Virtual private network feature and benefits
Vpn presentation
Shradhamaheshwari vpn
VPN In Details
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Institutional Correction lecture only . . .
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Computing-Curriculum for Schools in Ghana
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
master seminar digital applications in india
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
RMMM.pdf make it easy to upload and study
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
Institutional Correction lecture only . . .
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Microbial diseases, their pathogenesis and prophylaxis
Computing-Curriculum for Schools in Ghana
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
Pharma ospi slides which help in ospi learning
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
master seminar digital applications in india
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Ad

Introduction to Virtual Private Network and Components

  • 2. VIRTUAL PRIVATE NETWORK It basically encrypts the connection and makes the user’s IP address hidden by using various tunneling protocols. It is used to bypass geo-blocks and for security purposes. It is secure and private means for file sharing, communication and remotely accessing data without any risk of a hack.
  • 3. VPN tunneling ensures encryption at the user’s end and decryption at the receiver’s end, for this to happen the device should be connected to a VPN client software application.VPN acts as an intermediator between user and connection to the internet. It hides user IP address and makes a connection from VPN’s private network rather than the user’s ISP
  • 4. HISTORY OF VPN 1996 - a Microsoft’s employee started to work on Peer-to- Peer Tunneling Protocol 1999 - First VPN was published
  • 5. FEATURES VPN PROVIDES PLENTIFUL SERVER LOCATION. IT ALSO PROVIDES ANONYMOUS DNS SERVERS. VPNS ARE GENERALLY COST-EFFECTIVE. VPN SUPPORTS ROUTER. THE VPN IS HIGHLY ENCRYPTED AND SECURE. ALONG WITH VPN, WE GET SECURE VPN PROTOCOLS. IT PROVIDES SAFETY AGAINST DNS LEAK. THE VPN PROVIDERS ALSO OFFER CROSS- PLATFORM COMPATIBLE APPS.
  • 6. It maintains confidentiality of user’s data. It maintains the integrity of the user’s data that is the data cannot be changed in between the transmission. It ensures non-repudiation that is a sender cannot deny that he/she had not sent the data. Data authentication is also ensured by VPN, it verifies the source and destination’s authenticity. Characteristics of VPN
  • 7. APPLICATION OF VPN VPN can easily bypass geographic restrictions on websites or streaming audio and video. Using a VPN, we can protect ourselves from snooping from untrustworthy Wi-Fi hotspots. One can gain privacy online by hiding one’s true location. One can protect themselves from being logged while torrenting.
  • 8. VPN Protocol IP Security (IPsec) Point-to-Point Tunneling Protocol (PPTP) Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Layer 2 Tunnel Protocol (L2TP) OpenVPN It ensure an appropriate level of security with connected systems when the underlying network infrastructure can not provide it alone. To secure and encrypt, several different protocols can be used:
  • 9. WORKING PRINCIPLE OF VPN The working principle of a VPN involves creating a secure and encrypted connection between the user’s device and a VPN server. This connection is created using a combination of encryption protocols and network protocols. When a user connects to a VPN, their device sends a request to the VPN server to establish a secure connection. The VPN server responds by sending the user’s device a set of encryption keys, which are used to encrypt all data that is transmitted between the device and the VPN server.
  • 10. WORKING PRINCIPLE OF VPN Once the connection has been established, all data that is transmitted between the user’s device and the VPN server is encrypted using the encryption keys. This means that even if a hacker intercepts the data, they will not be able to read it. VPN also uses network protocols to ensure that the data is transmitted securely. The most common network protocol used by VPNs is the Internet Protocol Security (IPsec) protocol. IPsec provides a set of security protocols that ensure the integrity, confidentiality, and authenticity of the data that is transmitted over the internet.
  • 11. Advantages of VPN Improved Security: A VPN encrypts all data that is transmitted between the user’s device and the VPN server. This means that even if a hacker intercepts the data, they will not be able to read it. Privacy: A VPN masks the user’s IP address, making it difficult for websites and online services to track their online activity.
  • 12. Access to Restricted Content: Some websites and online services are restricted in certain countries. By using a VPN, users can connect to a server in another country and access the content that is restricted in their own country. Anonymity: By masking the user’s IP address and encrypting their data, a VPN provides a high level of anonymity online.
  • 13. Disadvantages of VPN The time taken to fetch the data sometimes increases when fetched through VPN, so there might be a performance issue with respect to time. VPN allows you to hide your identity but sometimes your VPN provider company itself steals your data, which can cause security issues.
  • 14. Whenever VPN disconnection occurs there is a possibility of IP address get revealed to the network from which connection was made. It is always not possible to bypass restrictions applied by a website by using a VPN.
  • 16. VPN PRIVACY YOUR BROWSING HISTORY YOUR LOCATION FOR STREAMING YOUR IP ADDRESS AND LOCATION YOUR DEVICES YOUR WEB ACTIVITY — TO MAINTAIN INTERNET FREEDOM 1. 2. 3. 4. 5.
  • 17. TYPES OF VPN TUNNELING VOLUNTARY TUNNELING COMPULSORY TUNNELING Tunneling is the technique of putting an integrated data packet into another packet (which contains routing information) and sending it over the internet. The packets travel through a path which is known as tunnel. To secure a tunneled transmission against interception, all traffic over a VPN is encrypted for safety.
  • 18. VOLUNTARY COMPULSORY VOLUNTARY VS COMPULSORY VPN client in the voluntary tunneling handles all the connection setup. Two step procedure is required to set up the VPN connection in voluntary tunneling. the client first establish a normal connection to the carrier then the carrier works as an intermediary to make a connection between a VPN server and that client. Compulsory tunneling provides complete management control of the tunnels to the ISP and hides the details of the connectivity of VPN server from the clients.
  • 19. VPN FRONT END PROCESSOR (FEP) NETWORK ACCESS SERVER (NAS) POINT OF PRESENCE SERVER (POS) BROKER DEVICES ARE USED IN COMPULSORY TUNNELING FOR THE VERIFICATION OF CLIENTS. THE LOGIC BUILD IN THE BROKER DEVICE ARE USED TO ASSOCIATES THE CLIENT WITH THE DIFFERENT VPN SERVERS. THIS NETWORK DEVICE IS ALSO CALLED AS THE FOLLOWING:
  • 20. ACTIVITY We will try to setup a VPN connection using Hamachi VPN