SlideShare a Scribd company logo
2
Most read
4
Most read
13
Most read
DYNAMIC VIRTUAL PRIVATE NETWORK
What Is A VPN? It is a private network that uses a public network to connect remote sites or users together. Instead of dedicated leased lines it uses virtual connections .
A Virtual Private Network
What makes a VPN? There  are 2 common VPN types: Remote Access Site-to-Site
Remote Access VPN Also called a VPDN i.e. Virtual Private Dial-up network. It is a user to LAN connection. It permits secure & encrypted connections between a company’s private network and remote users.
Site-to-Site VPN This may be one of the following- Intranet based  – Low cost , tunneled connections with services like IPSec. Extranet based  – Provides enhanced security features. It extends WANs to business partners.
Types Of VPN
What is Tunneling? It is the process of placing an entire packet within another packet and sending it over a network. It allows the users to encapsulate their data in IP packets to securely transfer the contents that lies within.
… continued Tunneling requires  3 protocols: Carrier Protocol  – used by the network Encapsulating protocol – the protocol that is wrapped around the data. Passenger protocol – the original data.
VPN Protocols 4 different protocols are there for creating VPN over Internet PPTP - Point-to-Point Tunneling protocol L2F – Layer 2 Forwarding L2TP – Layer 2 Tunneling Protocol IPSec – IP Security Protocol
Drawbacks of VPN Security – prone to be hacked Authentication – No proof of the sender Encryption – problem related with the Keys.
Traditional VPN Solutions VANs  – Value Added Networks based on private , closed , leased line  or dial-up access Advantages: Fast and High Volume transfer of data. Limitations: Expensive and Restricted Companies need to be belonged to same VAN to execute transactions.
…… continued Routers , Firewalls and Encrypted Routers provides a fair degree of security but the security can be compromised by someone using a stolen key. also the router system is too brittle to accommodate multiple users.
The Solution : DVPN DVPN i.e. Dynamic Virtual Private Network Dynamic stands for its ability to accommodate open , changing business requirements . This ability is based on its unique architecture and set of other features.
Working Of DVPN Before actually using it, a user or service must first join the VPN by registering with the CA. A Local Registration Agent approves all the registration requests.
… .continued The following steps illustrate user requesting information from a server : A user request information using a desktop application such as Internet Browser. The application secures and sends a message.
… continued The Message is transmitted over the network. The received message must pass security. For requests , the user’s access rights are verified. The requested information is secured and returned over the internet
Capabilities and Features Of DVPN Provides enhanced security Accommodates dynamically changes communities of users Provides ability to exchange information in various forms(web pages,files etc.) Maintains integrity over time regardless of any changes in technology.
Features Of DVPN Distributes access control mechanism Application independence Access control based on strongly anthenticated user identities Support for user groups.
CONCLUSION No matter how secure a company’s network is , hackers will still look for compromising the security , especially when it comes to VPN connections. So in order for businesses to receive full benefits of intranets and Internet technology , a DVPN needs to be implemented to establish trust in open environments & to make it flexible & finely controlled.
THANK YOU….

More Related Content

PDF
VPN (virtual private network)
PPT
Virtual Private Network main
PDF
VPN - Virtual Private Network
PPTX
Virtual Private Network(VPN)
PPTX
Virtual Private Network VPN
PPTX
Virtual private network(vpn)
PPTX
Vpn(virtual private network)
VPN (virtual private network)
Virtual Private Network main
VPN - Virtual Private Network
Virtual Private Network(VPN)
Virtual Private Network VPN
Virtual private network(vpn)
Vpn(virtual private network)

What's hot (20)

PPT
Virtual private network
PPTX
Virtual private networks (vpn)
PPT
Vpn presentation
PDF
PPT
Network Security
PPT
PPTX
Virtual Private Network
PPT
Virtual Private Network (VPN).
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
PPT
PPTX
Network address translation
PDF
MPLS Presentation
PPTX
22ETC15H_Internet of Things(IOT).pptx
PPTX
Data Center Networks
PPTX
Application layer protocols
PPT
Vpn presentation
PPTX
Presentation on VPN
PPTX
IP addressing seminar ppt
PPTX
Firewall presentation
Virtual private network
Virtual private networks (vpn)
Vpn presentation
Network Security
Virtual Private Network
Virtual Private Network (VPN).
VPN, Its Types,VPN Protocols,Configuration and Benefits
Network address translation
MPLS Presentation
22ETC15H_Internet of Things(IOT).pptx
Data Center Networks
Application layer protocols
Vpn presentation
Presentation on VPN
IP addressing seminar ppt
Firewall presentation
Ad

Viewers also liked (12)

PPTX
VPN (virtual Private Network)
PPTX
What Is VPN
PPTX
Virtual Private Network
PPT
Vpn Virtual Private Network
PPT
Network Security Threats and Solutions
DOC
Virtual private network
PPT
V P N
PPT
Vpn networks kami
PPTX
Gaming Console
PPT
CCNA Security 02- fundamentals of network security
PPTX
Bombaby stock exchange
PPTX
VPN Virtual Private Network
VPN (virtual Private Network)
What Is VPN
Virtual Private Network
Vpn Virtual Private Network
Network Security Threats and Solutions
Virtual private network
V P N
Vpn networks kami
Gaming Console
CCNA Security 02- fundamentals of network security
Bombaby stock exchange
VPN Virtual Private Network
Ad

Similar to Virtual Private Network (20)

PPTX
Vpn-Virtual Private Network
PPT
Vp npresentation 2
PPT
Virtual private networks by darshana viduranga
PPT
Vp npresentation
PPT
Vp npresentation
PPT
Presentation VPN
PPT
Vp npresentation (1)
PPT
VPN-Presentation presenation about VPN to learn more
PPTX
VPN aaaaaaaaaaaaaaaaaaaaaaaaaaa ppt.pptx
PDF
Lan Virtual Networks
PPT
VPNpresentationcomputer netwokr cyber ss.ppt
PPT
Vp npresentation
PDF
csevpnppt-170905123948 (1).pdf
PPTX
Virtual Private Networks (VPN) ppt
DOC
Virtual private network
PPT
VPN_ppt.ppt
PPT
Vpn_NJ ppt
Vpn-Virtual Private Network
Vp npresentation 2
Virtual private networks by darshana viduranga
Vp npresentation
Vp npresentation
Presentation VPN
Vp npresentation (1)
VPN-Presentation presenation about VPN to learn more
VPN aaaaaaaaaaaaaaaaaaaaaaaaaaa ppt.pptx
Lan Virtual Networks
VPNpresentationcomputer netwokr cyber ss.ppt
Vp npresentation
csevpnppt-170905123948 (1).pdf
Virtual Private Networks (VPN) ppt
Virtual private network
VPN_ppt.ppt
Vpn_NJ ppt

More from Rajan Kumar (20)

PPTX
Solar Sunseekar
PPTX
Cmos Sensor
PPT
Wind Turbine
PPT
Wind Mill
PPTX
PPTX
PPT
Temperature Distribution In Journal Bearing
PPT
Soler Car
PPT
Sensors On 3d Digitization
PPTX
PPTX
Holography
PPSX
Foult Tolerence In Distributed System
PPTX
Hydraulic Ram
PPSX
Implementation Of Bss And Nss In Mobile Communication
PPT
Infiband
PPTX
Smart Cards
PPT
PPT
Fluorescent Multi-Layer Disc
PPT
PPT
Optical Fibre Detector
Solar Sunseekar
Cmos Sensor
Wind Turbine
Wind Mill
Temperature Distribution In Journal Bearing
Soler Car
Sensors On 3d Digitization
Holography
Foult Tolerence In Distributed System
Hydraulic Ram
Implementation Of Bss And Nss In Mobile Communication
Infiband
Smart Cards
Fluorescent Multi-Layer Disc
Optical Fibre Detector

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Institutional Correction lecture only . . .
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Cell Types and Its function , kingdom of life
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Structure & Organelles in detailed.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharma ospi slides which help in ospi learning
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
O7-L3 Supply Chain Operations - ICLT Program
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Renaissance Architecture: A Journey from Faith to Humanism
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Institutional Correction lecture only . . .
Supply Chain Operations Speaking Notes -ICLT Program
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Cell Types and Its function , kingdom of life
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Structure & Organelles in detailed.

Virtual Private Network

  • 2. What Is A VPN? It is a private network that uses a public network to connect remote sites or users together. Instead of dedicated leased lines it uses virtual connections .
  • 4. What makes a VPN? There are 2 common VPN types: Remote Access Site-to-Site
  • 5. Remote Access VPN Also called a VPDN i.e. Virtual Private Dial-up network. It is a user to LAN connection. It permits secure & encrypted connections between a company’s private network and remote users.
  • 6. Site-to-Site VPN This may be one of the following- Intranet based – Low cost , tunneled connections with services like IPSec. Extranet based – Provides enhanced security features. It extends WANs to business partners.
  • 8. What is Tunneling? It is the process of placing an entire packet within another packet and sending it over a network. It allows the users to encapsulate their data in IP packets to securely transfer the contents that lies within.
  • 9. … continued Tunneling requires 3 protocols: Carrier Protocol – used by the network Encapsulating protocol – the protocol that is wrapped around the data. Passenger protocol – the original data.
  • 10. VPN Protocols 4 different protocols are there for creating VPN over Internet PPTP - Point-to-Point Tunneling protocol L2F – Layer 2 Forwarding L2TP – Layer 2 Tunneling Protocol IPSec – IP Security Protocol
  • 11. Drawbacks of VPN Security – prone to be hacked Authentication – No proof of the sender Encryption – problem related with the Keys.
  • 12. Traditional VPN Solutions VANs – Value Added Networks based on private , closed , leased line or dial-up access Advantages: Fast and High Volume transfer of data. Limitations: Expensive and Restricted Companies need to be belonged to same VAN to execute transactions.
  • 13. …… continued Routers , Firewalls and Encrypted Routers provides a fair degree of security but the security can be compromised by someone using a stolen key. also the router system is too brittle to accommodate multiple users.
  • 14. The Solution : DVPN DVPN i.e. Dynamic Virtual Private Network Dynamic stands for its ability to accommodate open , changing business requirements . This ability is based on its unique architecture and set of other features.
  • 15. Working Of DVPN Before actually using it, a user or service must first join the VPN by registering with the CA. A Local Registration Agent approves all the registration requests.
  • 16. … .continued The following steps illustrate user requesting information from a server : A user request information using a desktop application such as Internet Browser. The application secures and sends a message.
  • 17. … continued The Message is transmitted over the network. The received message must pass security. For requests , the user’s access rights are verified. The requested information is secured and returned over the internet
  • 18. Capabilities and Features Of DVPN Provides enhanced security Accommodates dynamically changes communities of users Provides ability to exchange information in various forms(web pages,files etc.) Maintains integrity over time regardless of any changes in technology.
  • 19. Features Of DVPN Distributes access control mechanism Application independence Access control based on strongly anthenticated user identities Support for user groups.
  • 20. CONCLUSION No matter how secure a company’s network is , hackers will still look for compromising the security , especially when it comes to VPN connections. So in order for businesses to receive full benefits of intranets and Internet technology , a DVPN needs to be implemented to establish trust in open environments & to make it flexible & finely controlled.