SlideShare a Scribd company logo
Submitted 
BY 
Mr.Milan Patel (110090107006) 
Mr.Vimal Gajera (110090107014) 
Submitted To 
Supervisor 
Prof. Saurabh Tandel 
Department of Computer Engineering 
C. K. PITHAWALLA COLLEGE OF ENGINEERING AND 
TECHNOLOGY, SURAT
Virtual Private Network is a type of private network 
that uses public telecommunication, such as the 
Internet, instead of leased lines to communicate. 
 It is virtual because it exists as a virtual entity within a 
public network 
 It is private because it is confined to a set of private 
users
 Provide users with secured remote access over the 
Internet to corporate resources 
 Connect two computer networks securely over the 
Internet 
 Example: Connect a branch office network to 
the network in the head office 
 Secure part of a corporate network for security and 
confidentiality purpose
Two connections – one is made to the Internet and 
the second is made to the VPN. 
Datagrams – contains data, destination and source 
information. 
Firewalls – VPNs allow authorized users to pass 
through the firewalls. 
Protocols – protocols create the VPN tunnels.
vpn
 User Authentication 
 Address Management 
 Data Encryption 
 Key Management 
 Multi-protocol Support
 VPN must be able to verify user authentication 
and allow only authorized users to access the 
network
 Assign addresses to clients and ensure that 
private addresses are kept private on the VPN
 Encrypt and decrypt the data to ensure that 
others on the not have access to the data
 Keys must be generated and refreshed for 
encryption at the server and the client 
 Note that keys are required for encryption
 The VPN technology must support commons 
protocols on the Internet such as IP, IPX etc.
PPTP -- Point-to-Point Tunneling Protocol 
L2TP -- Layer 2 Tunneling Protocol 
IPsec -- Internet Protocol Security 
SOCKS – is not used as much as the ones above
 Encapsulate and encrypt the data to be sent 
over a corporate or public IP network
 Encrypted and encapsulated to be sent over a 
communication links that support user 
datagram mode of transmission 
 Examples of links include X . 2 5, Frame 
Relay and ATM
 Encapsulate and encrypt in an IP header for 
transmission over an IP network
FIREWALLS 
ENCRYPTION 
 IPSEC PROTOCOL 
AAA SERVER
vpn
Symmetric-key encryption 
Public-key encryption
vpn
 AAA means Authentication, Authorization and 
Accounting servers 
 AAA then checks the following: 
Who you are (authentication) 
What you are allowed to do (authorization) 
What you actually do (accounting)
 Tunneling involves the encapsulation, 
transmission and decapsulation of data packets 
 The data is encapsulated with additional headers 
 The additional headers provide routing 
information for encapsulated data to be routed 
between the end points of a tunnel
 A virtual point-to-point connection 
made through a public network. It transports 
encapsulated datagrams. 
Original Datagram 
Encrypted Inner Datagram 
Datagram Header Outer Datagram Data Area 
Data Encapsulation [From Comer]
vpn
vpn
 Eliminating the need for expensive long-distance 
leased lines 
 Reducing the long-distance telephone charges for 
remote access. 
 Transferring the support burden to the service 
providers 
 Operational costs 
 Cisco VPN Savings Calculator
Flexibility of growth 
Efficiency with broadband technology
VPNs require an in-depth understanding of public 
network security issues and proper deployment of 
precautions 
Availability and performance depends on factors 
largely outside of their control 
Immature standards 
VPNs need to accommodate protocols other than 
IP and existing internal network technology
Large-scale encryption between multiple fixed 
sites such as remote offices and central offices 
Network traffic is sent over the branch office 
Internet connection 
This saves the company hardware and 
management expenses
vpn
Encrypted connections between mobile or remote 
users and their corporate networks 
Remote user can make a local call to an ISP, as 
opposed to a long distance call to the corporate 
remote access server. 
Ideal for a telecommuter or mobile sales people. 
VPN allows mobile workers & telecommuters to 
take advantage of broadband connectivity. 
i.e. DSL, Cable
 Healthcare: enables the transferring of confidential patient 
information within the medical facilities & health care provider 
Manufacturing: allow suppliers to view inventory & allow clients to 
purchase online safely 
 Retail: able to securely transfer sales data or customer info between 
stores & the headquarters 
 Bankin g /Financial : enables account information to be transferred 
safely within departments & branches 
 General Business: communication between remote employees can be 
securely exchanged
63% 
50% 
90% 
79% 
Remote access for 
employees working out 
of homes 
Remote access for 
employees while 
traveling 
Site-to-site connectivity 
between offices 
Access to network for 
0% 20% 40% 60% 80% 100% 
business 
partners/customers 
% of Respondents 
Percentages 
*Source: www.cisco.com
CVS Pharmaceutical Corporation upgraded their 
frame relay network to an IP VPN 
ITW Foilmark secured remote location orders, 
running reports, & internet / intranet 
communications w/ a 168 -bit encryption by 
switching to OpenReach VPN 
Bacardi & Co. Implemented a 21 -country, 44- 
location VPN
VPNs are continually being enhanced. 
Example: Equant NV 
As the VPN market becomes larger, more 
applications will be created along with more VPN 
providers and new VPN types. 
Networks are expected to converge to create an 
integrated VPN 
Improved protocols are expected, which will also 
improve VPNs.
vpn

More Related Content

PPTX
Virtual Private Network(VPN)
PPT
my presentation on vpn
PPT
Vpn presentation
PPT
PPTX
Presentation vpn
DOC
Report File On Virtual Private Network(VPN)
PPTX
Virtual private networks (vpn)
PPTX
Virtual Private Networks (VPN) ppt
Virtual Private Network(VPN)
my presentation on vpn
Vpn presentation
Presentation vpn
Report File On Virtual Private Network(VPN)
Virtual private networks (vpn)
Virtual Private Networks (VPN) ppt

What's hot (20)

PPTX
Virtual Private Network VPN
PPT
Virtual private network feature and benefits
PPT
Virtual private network
PPTX
WLAN:VPN Security
DOCX
Virtual Private Network
PDF
Implementation of a Virtual Private Network - VPN
PPT
Vp npresentation 2
PPTX
Vpn-Virtual Private Network
PDF
VPN (virtual private network)
PPTX
Virtual Private Network- VPN
PPTX
Vpn(virtual private network)
PDF
Vpn security
PDF
Implementing VPN Virtual Private Networks for Small Offices/Organizations
PDF
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
PPT
Virtual Private Network
PPT
Vpn networks kami
PPTX
Virtual Private Network
PPTX
Virtual private network
Virtual Private Network VPN
Virtual private network feature and benefits
Virtual private network
WLAN:VPN Security
Virtual Private Network
Implementation of a Virtual Private Network - VPN
Vp npresentation 2
Vpn-Virtual Private Network
VPN (virtual private network)
Virtual Private Network- VPN
Vpn(virtual private network)
Vpn security
Implementing VPN Virtual Private Networks for Small Offices/Organizations
VPN, Its Types,VPN Protocols,Configuration and Benefits
Virtual Private Network
Vpn networks kami
Virtual Private Network
Virtual private network
Ad

Viewers also liked (18)

PPTX
Desarrollo del periodismo digital
PPTX
Sampling activity calendar
PDF
Innovative teaching manual
DOCX
02 vineetha (1)
PDF
Practica 4
PDF
Modal kombat sxsw
DOCX
Kagiso Mutheto CV
PDF
Friday Forum - Indy Full Circle Master Plan
PPTX
Desarrollo de la Web 1997-2016
PDF
Friday Forum - State of Education Presentation
PPTX
2016 09-03 jazug
PPTX
Surviving as a Monolith in a Microservices World - by Blair Olynyk, Hyperwallet
PPTX
fire preventing robot ppt copy
PPTX
Goals mai schweizer, english honors period 1
PPTX
FUNDAMENTAL RIGHTS
PPTX
Azure Web Apps 入門
DOCX
FEATURES OF GOOD SOCIAL SCIENCE TEXT BOOK
PPTX
Xamarin開発環境の選択
Desarrollo del periodismo digital
Sampling activity calendar
Innovative teaching manual
02 vineetha (1)
Practica 4
Modal kombat sxsw
Kagiso Mutheto CV
Friday Forum - Indy Full Circle Master Plan
Desarrollo de la Web 1997-2016
Friday Forum - State of Education Presentation
2016 09-03 jazug
Surviving as a Monolith in a Microservices World - by Blair Olynyk, Hyperwallet
fire preventing robot ppt copy
Goals mai schweizer, english honors period 1
FUNDAMENTAL RIGHTS
Azure Web Apps 入門
FEATURES OF GOOD SOCIAL SCIENCE TEXT BOOK
Xamarin開発環境の選択
Ad

Similar to vpn (20)

PPT
VPN_ppt.ppt
PPT
VPN_basics_and_necssitated_Technologies.ppt
PPT
Vvirtualnet-basic.ppt
PPT
virtual private network vpn pros and cons
PPT
Fundamentals of Virtual Private Networks (VPNs)
PPT
Virtual Private Networks VPN basics.ppt
PPT
VPN basicvxvvxxv xv xvxv x vx vx vxvs.ppt
PPT
Vp npresentation
PPT
Vp npresentation (1)
PPTX
VPN (virtual Private Network)
PPT
Virtual Private Network main
PPT
Virtual Private Network (VPN).
PPTX
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
PPT
VPN-Presentation presenation about VPN to learn more
PPTX
PPT
Vpn presentation
PPT
Remote access connection
PDF
The Virtual Private Network
PDF
Lan Virtual Networks
VPN_ppt.ppt
VPN_basics_and_necssitated_Technologies.ppt
Vvirtualnet-basic.ppt
virtual private network vpn pros and cons
Fundamentals of Virtual Private Networks (VPNs)
Virtual Private Networks VPN basics.ppt
VPN basicvxvvxxv xv xvxv x vx vx vxvs.ppt
Vp npresentation
Vp npresentation (1)
VPN (virtual Private Network)
Virtual Private Network main
Virtual Private Network (VPN).
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VPN-Presentation presenation about VPN to learn more
Vpn presentation
Remote access connection
The Virtual Private Network
Lan Virtual Networks

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Lesson notes of climatology university.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
Computing-Curriculum for Schools in Ghana
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Lesson notes of climatology university.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Sports Quiz easy sports quiz sports quiz
Module 4: Burden of Disease Tutorial Slides S2 2025
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india

vpn

  • 1. Submitted BY Mr.Milan Patel (110090107006) Mr.Vimal Gajera (110090107014) Submitted To Supervisor Prof. Saurabh Tandel Department of Computer Engineering C. K. PITHAWALLA COLLEGE OF ENGINEERING AND TECHNOLOGY, SURAT
  • 2. Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.  It is virtual because it exists as a virtual entity within a public network  It is private because it is confined to a set of private users
  • 3.  Provide users with secured remote access over the Internet to corporate resources  Connect two computer networks securely over the Internet  Example: Connect a branch office network to the network in the head office  Secure part of a corporate network for security and confidentiality purpose
  • 4. Two connections – one is made to the Internet and the second is made to the VPN. Datagrams – contains data, destination and source information. Firewalls – VPNs allow authorized users to pass through the firewalls. Protocols – protocols create the VPN tunnels.
  • 6.  User Authentication  Address Management  Data Encryption  Key Management  Multi-protocol Support
  • 7.  VPN must be able to verify user authentication and allow only authorized users to access the network
  • 8.  Assign addresses to clients and ensure that private addresses are kept private on the VPN
  • 9.  Encrypt and decrypt the data to ensure that others on the not have access to the data
  • 10.  Keys must be generated and refreshed for encryption at the server and the client  Note that keys are required for encryption
  • 11.  The VPN technology must support commons protocols on the Internet such as IP, IPX etc.
  • 12. PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above
  • 13.  Encapsulate and encrypt the data to be sent over a corporate or public IP network
  • 14.  Encrypted and encapsulated to be sent over a communication links that support user datagram mode of transmission  Examples of links include X . 2 5, Frame Relay and ATM
  • 15.  Encapsulate and encrypt in an IP header for transmission over an IP network
  • 16. FIREWALLS ENCRYPTION  IPSEC PROTOCOL AAA SERVER
  • 20.  AAA means Authentication, Authorization and Accounting servers  AAA then checks the following: Who you are (authentication) What you are allowed to do (authorization) What you actually do (accounting)
  • 21.  Tunneling involves the encapsulation, transmission and decapsulation of data packets  The data is encapsulated with additional headers  The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel
  • 22.  A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Data Encapsulation [From Comer]
  • 25.  Eliminating the need for expensive long-distance leased lines  Reducing the long-distance telephone charges for remote access.  Transferring the support burden to the service providers  Operational costs  Cisco VPN Savings Calculator
  • 26. Flexibility of growth Efficiency with broadband technology
  • 27. VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology
  • 28. Large-scale encryption between multiple fixed sites such as remote offices and central offices Network traffic is sent over the branch office Internet connection This saves the company hardware and management expenses
  • 30. Encrypted connections between mobile or remote users and their corporate networks Remote user can make a local call to an ISP, as opposed to a long distance call to the corporate remote access server. Ideal for a telecommuter or mobile sales people. VPN allows mobile workers & telecommuters to take advantage of broadband connectivity. i.e. DSL, Cable
  • 31.  Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely  Retail: able to securely transfer sales data or customer info between stores & the headquarters  Bankin g /Financial : enables account information to be transferred safely within departments & branches  General Business: communication between remote employees can be securely exchanged
  • 32. 63% 50% 90% 79% Remote access for employees working out of homes Remote access for employees while traveling Site-to-site connectivity between offices Access to network for 0% 20% 40% 60% 80% 100% business partners/customers % of Respondents Percentages *Source: www.cisco.com
  • 33. CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN ITW Foilmark secured remote location orders, running reports, & internet / intranet communications w/ a 168 -bit encryption by switching to OpenReach VPN Bacardi & Co. Implemented a 21 -country, 44- location VPN
  • 34. VPNs are continually being enhanced. Example: Equant NV As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types. Networks are expected to converge to create an integrated VPN Improved protocols are expected, which will also improve VPNs.