SlideShare a Scribd company logo
Modul 5 VPN.ppt
Modul 5 VPN.ppt
3
long-distance dial-up connection
4
Figure 7-9 A WAN using frame relay
5
A BRI link
A PRI link
6
T-carrier connecting to a LAN through a router
point-to-point T-carrier connection
CSU/DSU
7
DSL connection
8
SONET ring
 Virtual Private Network is a type of private
network that uses public
telecommunication, such as the Internet,
instead of leased lines to communicate.
 Became popular as more employees worked
in remote locations.
(From Gartner Consulting)
 Secure VPNs use cryptographic tunneling
protocols.
◦ IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3, VPN-
Q and MPVPN
 Trusted VPNs rely on the security of a single
provider’s network to protect the traffic.
◦ MPLS and L2F
A virtual point-to-point connection
made through a public network. It transports
encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Original Datagram
Data Encapsulation [From Comer]
Two types of end points:
 Remote Access
 Site-to-Site
Modul 5 VPN.ppt
Figure 1
Modul 5 VPN.ppt
Modul 5 VPN.ppt
 Authentication – validates that the data was sent from the
sender.
 Access control – limiting unauthorized users from
accessing the network.
 Confidentiality – preventing the data to be read or copied
as the data is being transported.
 Data Integrity – ensuring that the data has not been
altered
 Cryptography Technic
Encryption -- is a method of “scrambling” data before
transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
 VPN can be deployed in three ways :
 Host to host
 Site-to-Site
 Host-to-Site
Modul 5 VPN.ppt
 Remote access VPN
 Intranet VPN
 Extranet VPN
Modul 5 VPN.ppt
Modul 5 VPN.ppt
Modul 5 VPN.ppt
Modul 5 VPN.ppt
Modul 5 VPN.ppt
Modul 5 VPN.ppt
Modul 5 VPN.ppt
Modul 5 VPN.ppt
 MPLS = Multi Protocol Label Switching
 Suatu metode forwarding (meneruskan data/paket
melalui suatu jaringan dengan menggunakan informasi
label yang dilekatkan pada I
 Memungkinkan router meneruskan paket dengan hanya
melihat label yang melekat pada paket tersebut,
sehinggap tidak perlu lagi melihat alamat IP tujuan)
Back
 Perpaduan mekanisme Label Swapping (Layer
2) dan Routing (Layer 3)
 Terdiri atas LSR yang saling terhubung,
membentuk suatu LSP
 LSR pertama disebut ingress
 LSR terakhir disebut egress
 Bagian tepi dari jaringan LSR disebut LER
Back
 LSR = Label Switched Router
 LSP = Label Switched Path
 LER = Label Edge Router
 TTL = Time to Live
Back
 Pembuatan label dan distribusi
 Pembuatan label dalam tiap router
 Pembuatan jalur label yang terhubung
 Pemasukan label
 Forwarding paket
Back

More Related Content

PDF
Virtual private networks
PPTX
PPTX
WLAN:VPN Security
PDF
VPN - Virtual Private Network
PPT
Tunneling in MPLS
PDF
PPT
Shradhamaheshwari vpn
Virtual private networks
WLAN:VPN Security
VPN - Virtual Private Network
Tunneling in MPLS
Shradhamaheshwari vpn

Similar to Modul 5 VPN.ppt (20)

PPT
Virtual Private Network (VPN).
PPT
Vpn_NJ ppt
PPT
Vpn networks kami
PPTX
Types of VPN
PDF
28 11 sep17 14aug 8386 9970-1-ed(edit)
PDF
28 11 sep17 14aug 8386 9970-1-ed(edit)
PPT
VPN_ppt.ppt
PDF
VPN (virtual private network)
PPT
VPN-Presentation presenation about VPN to learn more
PPT
Vpn presentation
PPT
PDF
Network access layer security protocol
PPT
Virtual private network
PPTX
Introduction to firewalls and virtual private networks
PPT
Virtual private networks by darshana viduranga
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
Virtual Private Network (VPN).
Vpn_NJ ppt
Vpn networks kami
Types of VPN
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
VPN_ppt.ppt
VPN (virtual private network)
VPN-Presentation presenation about VPN to learn more
Vpn presentation
Network access layer security protocol
Virtual private network
Introduction to firewalls and virtual private networks
Virtual private networks by darshana viduranga
VPN, Its Types,VPN Protocols,Configuration and Benefits

More from cemporku (18)

PPT
Lesson 01 Interaksi Manusia Dan Komputer.ppt
PPTX
02_Slide Step 1 Know your User and Client.pptx
PPTX
Pengantar PAA Materi pertemuan ke 1.pptx
PPTX
Interaksi Manusia Dan Komputer Pertemuan 1
PDF
ABSEN UAS KELAS KA SEMESTER 2 TAHUN 2023 RUANG 1.pdf
PPT
Materi S8stem Basis Data Entity Relationship Model.ppt
PDF
Materi matakuliah Ekonomi Digital Pertemuan Ke 1
PPT
Week5-Jaringan-Komputer.ppt
PPTX
JARINGAN KOMUNIKASI DATA.pptx
PPTX
Slide-01.pptx
PPT
Keamanan Jaringan.ppt
PPT
Modul 7 Trojan, Backdoors,RootKit.ppt
PPT
Modul 5 VPN_2.ppt
PPT
Modul 4 Intrusion Detection System IDS.ppt
PPT
Modul 3 Firewalll.ppt
PPT
Modul 2 - Footprinting Scanning Enumeration.ppt
PPTX
Minggu #1 konsep sistem temu kembali informasi
DOCX
Materi Pemrograman Visual Pertemuan 4
Lesson 01 Interaksi Manusia Dan Komputer.ppt
02_Slide Step 1 Know your User and Client.pptx
Pengantar PAA Materi pertemuan ke 1.pptx
Interaksi Manusia Dan Komputer Pertemuan 1
ABSEN UAS KELAS KA SEMESTER 2 TAHUN 2023 RUANG 1.pdf
Materi S8stem Basis Data Entity Relationship Model.ppt
Materi matakuliah Ekonomi Digital Pertemuan Ke 1
Week5-Jaringan-Komputer.ppt
JARINGAN KOMUNIKASI DATA.pptx
Slide-01.pptx
Keamanan Jaringan.ppt
Modul 7 Trojan, Backdoors,RootKit.ppt
Modul 5 VPN_2.ppt
Modul 4 Intrusion Detection System IDS.ppt
Modul 3 Firewalll.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
Minggu #1 konsep sistem temu kembali informasi
Materi Pemrograman Visual Pertemuan 4

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Lesson notes of climatology university.
PPTX
Cell Types and Its function , kingdom of life
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
O5-L3 Freight Transport Ops (International) V1.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
Module 4: Burden of Disease Tutorial Slides S2 2025
01-Introduction-to-Information-Management.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
O7-L3 Supply Chain Operations - ICLT Program
Lesson notes of climatology university.
Cell Types and Its function , kingdom of life
GDM (1) (1).pptx small presentation for students
Pharmacology of Heart Failure /Pharmacotherapy of CHF
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study

Modul 5 VPN.ppt

  • 4. 4 Figure 7-9 A WAN using frame relay
  • 5. 5 A BRI link A PRI link
  • 6. 6 T-carrier connecting to a LAN through a router point-to-point T-carrier connection CSU/DSU
  • 9.  Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  Became popular as more employees worked in remote locations.
  • 11.  Secure VPNs use cryptographic tunneling protocols. ◦ IPsec, SSL/TLS, OpenVPN, PPTP, L2TP, L2TPv3, VPN- Q and MPVPN  Trusted VPNs rely on the security of a single provider’s network to protect the traffic. ◦ MPLS and L2F
  • 12. A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] Two types of end points:  Remote Access  Site-to-Site
  • 17.  Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered  Cryptography Technic Encryption -- is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature – for authentication
  • 18.  VPN can be deployed in three ways :  Host to host  Site-to-Site  Host-to-Site
  • 20.  Remote access VPN  Intranet VPN  Extranet VPN
  • 29.  MPLS = Multi Protocol Label Switching  Suatu metode forwarding (meneruskan data/paket melalui suatu jaringan dengan menggunakan informasi label yang dilekatkan pada I  Memungkinkan router meneruskan paket dengan hanya melihat label yang melekat pada paket tersebut, sehinggap tidak perlu lagi melihat alamat IP tujuan)
  • 30. Back
  • 31.  Perpaduan mekanisme Label Swapping (Layer 2) dan Routing (Layer 3)  Terdiri atas LSR yang saling terhubung, membentuk suatu LSP  LSR pertama disebut ingress  LSR terakhir disebut egress  Bagian tepi dari jaringan LSR disebut LER Back
  • 32.  LSR = Label Switched Router  LSP = Label Switched Path  LER = Label Edge Router  TTL = Time to Live Back
  • 33.  Pembuatan label dan distribusi  Pembuatan label dalam tiap router  Pembuatan jalur label yang terhubung  Pemasukan label  Forwarding paket Back