By Divam Goel
What is a VPN?
A virtual network overlaid on top of the
ubiquitous interconnection of the Internet
and a private network for confidential
communications and exclusive usage.
VPNs
In a virtual private network (VPN), "virtual"
implies that there is no physical network
infrastructure dedicated to the private network.
Instead, a single physical network infrastructure
is shared among various logical networks
In VPNs, various networking technologies are
applied toward the goal of providing private
communications within the public Internet
infrastructure
Private Networks

Separate Private Networks.
Why VPNs?
Separate private networking solutions are
expensive and cannot be updated quickly
to adapt to changes in business
requirements.
The Internet is inexpensive but does not
by itself ensure privacy.
The Internet

Virtual Private Networking: the collection of

technologies applied to a public network
—the Internet—to provide solutions for
private networking needs.
VPN

Motivation

Ubiquitous Coverage - wider coverage
compared with the private data network
infrastructures offered by
telecommunication providers
Cost Reduction - based on the system's
economy of scale
Security – using cryptographic technology
E-Commerce - VPNs provide both
interconnectivity and security.
The VPN MarketPlace
VPN Products: Hardware and Software that make
VPNs possible
– A VPN gateway is a stand-alone device that
enables authorized access to the protected
network resources. The resources are not
located on the same physical device with
the VPN gateway
– A VPN client, on the other hand, is installed
on the same network device it is supposed
to protect. Usually, the client is a software
package installed on the host computer.
The VPN MarketPlace
VPN SERVICES:
– Contracted VPN service
– Service level agreements (SLAs)
VPN

Barriers

Lack of interoperability of IPSec*
implementations.
????????
Lack of widely used quality of service (QoS)
standards, as well as the sparse
deployment of QoS-capable infrastructures
Security services in support of VPNs must
be constructed from additional hardware
and software components as Internet
infrastructure is still largely focused on
providing connectivity and does not yet
offer services beyond connectivity.
*IPSec: Internet Security standards established by IAB
VPN Technologies

 Tunneling – using encapsulation
 Authentication
 Access Control
 Data Security
VPN Solutions
VPN solution consists of multiple, appropriately
configured VPN devices that are placed in the
appropriate locations within the network.
VPN Gateway Interface

The VPN client is software used for remote
access for a single computer or user.
VPN Network and Service Management.
VPN Vendors
Layer 2 Tunneling Protocol (L2TP): utilizing Cisco
Systems” Layer-2 Forwarding and Microsoft’s
Point-o-Point Tunneling Protocol (PPTP)
– Supports IP, IPX, AppleTalk, frame relay, ATM,
S.25 and Sonet
IBM Nways Multiprotocol Routing Services (MRS),
Nways Multiprotocol Access Services(MAS) and
Access Integration Services(AIS)
– Supports IP, APPN,TN3270
And there are many more………
Types of VPNs
Site to Site VPNs
– Using ISDN, Frame Relay or ATM
– Designed to replace a WAN

Remote Access VPNs
– Using the Internet
– Provide remote access to mobile or branch
employees
Site-to-Site VPN
VPNs Based on ISDN, Frame Relay or ATM
Site-to-Site VPN vs WAN
Remote Access VPN
VPNs Based on IP Tunnels/
Internet VPNs
What are the costs?

Cost Savings $$

Monthly Cost Savings for Site-to-Site
VPN
800000
700000
600000
500000
400000
300000
200000
100000
0

678255

134055
0
0

2000

4000

6000

Using the Cisco
website
calculator a
comparison of
three scenarios
was made.
Not for small
enterprises!!

Number of users

*
www.cisco.com/warp/public/779/largeent/learn/technologies/vpn/site2site.html
VPN

Directions

Integration of VPN and firewall functions into a
single device.
Incorporating routing and quality of service
features into the VPN device will make it even
more versatile and more attractive to businesses.
Adding intelligence to the network – Currently the
routers and switches merely forward the packets
without knowing what is inside them or how to
process them accordingly. ??
Questions?????

More Related Content

PPT
PDF
Cloud networking use cases with VNS3
PPTX
Virtual Private Networks (VPN) ppt
PPT
Virtual Private Network
PPT
V P N
DOC
Report File On Virtual Private Network(VPN)
PPT
Vp npresentation 2
PPT
Wireless LAN security
Cloud networking use cases with VNS3
Virtual Private Networks (VPN) ppt
Virtual Private Network
V P N
Report File On Virtual Private Network(VPN)
Vp npresentation 2
Wireless LAN security

What's hot (20)

PPT
my presentation on vpn
PPTX
Zigbee Presentation
PPT
12 Understanding V P Ns
PPTX
WLAN:VPN Security
PPTX
Module 6 Wireless Network security
PPTX
Presentation vpn
PPTX
Virtual Private Network
PDF
Zigbee technology and its application in
PPT
Zigbee
PPT
PPTX
WLAN SECURITY BY SAIKIRAN PANJALA
PPTX
Virtual Private Network(VPN)
PPT
Wi fi protected access
PPTX
Wireless lan security
DOCX
Zigbee abstract
PPTX
Vpn(virtual private network)
PPT
Vpn presentation
PPTX
Dccn ppt
PPT
Sensor(zigbee)
PDF
IRJET- A Survey of Working on Virtual Private Networks
my presentation on vpn
Zigbee Presentation
12 Understanding V P Ns
WLAN:VPN Security
Module 6 Wireless Network security
Presentation vpn
Virtual Private Network
Zigbee technology and its application in
Zigbee
WLAN SECURITY BY SAIKIRAN PANJALA
Virtual Private Network(VPN)
Wi fi protected access
Wireless lan security
Zigbee abstract
Vpn(virtual private network)
Vpn presentation
Dccn ppt
Sensor(zigbee)
IRJET- A Survey of Working on Virtual Private Networks
Ad

Viewers also liked (7)

PPTX
Changing Our Attitudes to Search - Phil Bradley
PPTX
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
PDF
The Future of the Internet, Commerce and Communications - Gerd Leonhard
PDF
Rachel Green Jove
PDF
Social Business - Alpesh Doshi
PPTX
Influence and Leadership - Simon Edwards
PDF
James Andrews User Engagement
Changing Our Attitudes to Search - Phil Bradley
Managing Eresources and Digitalization - Robert Kiley, Tom Crane
The Future of the Internet, Commerce and Communications - Gerd Leonhard
Rachel Green Jove
Social Business - Alpesh Doshi
Influence and Leadership - Simon Edwards
James Andrews User Engagement
Ad

Similar to Virtual Private Networks (20)

DOC
Virtual private network
PDF
VPN (virtual private network)
DOC
Virtual private network
PPT
VPNpresentationcomputer netwokr cyber ss.ppt
PPT
VPN-Presentation presenation about VPN to learn more
PPTX
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
PPT
Vp npresentation
PPT
Vp npresentation
PPT
VirtualPrivatcxsdfsfsfsdfsfsfsdfeNetwork.ppt
PPT
VirtualPrivateNetwork.ppt around the world accordingly
PPT
Virtual Private Network Presentation.ppt
PPT
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
PPT
VirtualPrivateNetwork.ppt
PPT
VPN mean .ppt
PPT
About vpn network .ppt
PPT
Shradhamaheshwari vpn
PPT
VPN_ppt.ppt
PPT
Vp npresentation (1)
Virtual private network
VPN (virtual private network)
Virtual private network
VPNpresentationcomputer netwokr cyber ss.ppt
VPN-Presentation presenation about VPN to learn more
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Vp npresentation
Vp npresentation
VirtualPrivatcxsdfsfsfsdfsfsfsdfeNetwork.ppt
VirtualPrivateNetwork.ppt around the world accordingly
Virtual Private Network Presentation.ppt
VirtualPrivateNetwork PRESENTED BY RACHNA AGARWALL
VirtualPrivateNetwork.ppt
VPN mean .ppt
About vpn network .ppt
Shradhamaheshwari vpn
VPN_ppt.ppt
Vp npresentation (1)

More from Divam Goyal (20)

PPTX
How Social media Effect Social life
PPTX
Mars the red_planet
PPT
ISO Certificate
PPTX
Technology
PPTX
Piano and keyboard
PPT
Blade server
PPTX
PPT
Steganography
PPT
Input device
PPTX
New energy resources
PPTX
Web Browsers
PPTX
Operating System
PPTX
Inflection
PPT
Smart cards
PPT
Steganography
PPT
Biometrics
PPT
Big bazaar
PPTX
Brain rules
PPT
Bhagat Singh
PPT
How Social media Effect Social life
Mars the red_planet
ISO Certificate
Technology
Piano and keyboard
Blade server
Steganography
Input device
New energy resources
Web Browsers
Operating System
Inflection
Smart cards
Steganography
Biometrics
Big bazaar
Brain rules
Bhagat Singh

Recently uploaded (20)

PPTX
Computer Hardware - Technology and Livelihood Education
PDF
CAB UNIT 1 with computer details details
PPTX
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
PDF
GENERATOR AND IMPROVED COIL THEREFOR HAVINGELECTRODYNAMIC PROPERTIES
PDF
Printing Presentation to show beginners.
PDF
20A LG INR18650HJ2 3.6V 2900mAh Battery cells for Power Tools Vacuum Cleaner
PPTX
Presentation (1).pptx gjkbhhjk hjjgtihkk
PPTX
Chapter no 8 output devices dpart 2.pptx
PPTX
Presentation societal project DEEPIKA T.pptx
PPT
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
PPTX
Unit-1.pptxgeyeuueueu7r7r7r77r7r7r7uriruru
PPTX
最新版新加坡英华美学院毕业证(Informatics毕业证书)原版定制硕士文凭
PPTX
ppt to the world finance to the world in growing
PPTX
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
PDF
Topic-1-Main-Features-of-Data-Processing.pdf
PPT
Soldering technics Aerospace electronic assembly
PPTX
Subordinate_Clauses_BlueGradient_Optimized.pptx
PDF
SAHIL PROdhdjejss yo yo pdf TOCOL PPT.pdf
PPTX
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
PPTX
Operating_Systems_Presentation_With_Icons (1).pptx
Computer Hardware - Technology and Livelihood Education
CAB UNIT 1 with computer details details
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
GENERATOR AND IMPROVED COIL THEREFOR HAVINGELECTRODYNAMIC PROPERTIES
Printing Presentation to show beginners.
20A LG INR18650HJ2 3.6V 2900mAh Battery cells for Power Tools Vacuum Cleaner
Presentation (1).pptx gjkbhhjk hjjgtihkk
Chapter no 8 output devices dpart 2.pptx
Presentation societal project DEEPIKA T.pptx
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
Unit-1.pptxgeyeuueueu7r7r7r77r7r7r7uriruru
最新版新加坡英华美学院毕业证(Informatics毕业证书)原版定制硕士文凭
ppt to the world finance to the world in growing
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
Topic-1-Main-Features-of-Data-Processing.pdf
Soldering technics Aerospace electronic assembly
Subordinate_Clauses_BlueGradient_Optimized.pptx
SAHIL PROdhdjejss yo yo pdf TOCOL PPT.pdf
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
Operating_Systems_Presentation_With_Icons (1).pptx

Virtual Private Networks

  • 2. What is a VPN? A virtual network overlaid on top of the ubiquitous interconnection of the Internet and a private network for confidential communications and exclusive usage.
  • 3. VPNs In a virtual private network (VPN), "virtual" implies that there is no physical network infrastructure dedicated to the private network. Instead, a single physical network infrastructure is shared among various logical networks In VPNs, various networking technologies are applied toward the goal of providing private communications within the public Internet infrastructure
  • 5. Why VPNs? Separate private networking solutions are expensive and cannot be updated quickly to adapt to changes in business requirements. The Internet is inexpensive but does not by itself ensure privacy.
  • 6. The Internet Virtual Private Networking: the collection of technologies applied to a public network —the Internet—to provide solutions for private networking needs.
  • 7. VPN Motivation Ubiquitous Coverage - wider coverage compared with the private data network infrastructures offered by telecommunication providers Cost Reduction - based on the system's economy of scale Security – using cryptographic technology E-Commerce - VPNs provide both interconnectivity and security.
  • 8. The VPN MarketPlace VPN Products: Hardware and Software that make VPNs possible – A VPN gateway is a stand-alone device that enables authorized access to the protected network resources. The resources are not located on the same physical device with the VPN gateway – A VPN client, on the other hand, is installed on the same network device it is supposed to protect. Usually, the client is a software package installed on the host computer.
  • 9. The VPN MarketPlace VPN SERVICES: – Contracted VPN service – Service level agreements (SLAs)
  • 10. VPN Barriers Lack of interoperability of IPSec* implementations. ???????? Lack of widely used quality of service (QoS) standards, as well as the sparse deployment of QoS-capable infrastructures Security services in support of VPNs must be constructed from additional hardware and software components as Internet infrastructure is still largely focused on providing connectivity and does not yet offer services beyond connectivity. *IPSec: Internet Security standards established by IAB
  • 11. VPN Technologies  Tunneling – using encapsulation  Authentication  Access Control  Data Security
  • 12. VPN Solutions VPN solution consists of multiple, appropriately configured VPN devices that are placed in the appropriate locations within the network. VPN Gateway Interface The VPN client is software used for remote access for a single computer or user. VPN Network and Service Management.
  • 13. VPN Vendors Layer 2 Tunneling Protocol (L2TP): utilizing Cisco Systems” Layer-2 Forwarding and Microsoft’s Point-o-Point Tunneling Protocol (PPTP) – Supports IP, IPX, AppleTalk, frame relay, ATM, S.25 and Sonet IBM Nways Multiprotocol Routing Services (MRS), Nways Multiprotocol Access Services(MAS) and Access Integration Services(AIS) – Supports IP, APPN,TN3270 And there are many more………
  • 14. Types of VPNs Site to Site VPNs – Using ISDN, Frame Relay or ATM – Designed to replace a WAN Remote Access VPNs – Using the Internet – Provide remote access to mobile or branch employees
  • 15. Site-to-Site VPN VPNs Based on ISDN, Frame Relay or ATM
  • 17. Remote Access VPN VPNs Based on IP Tunnels/ Internet VPNs
  • 18. What are the costs? Cost Savings $$ Monthly Cost Savings for Site-to-Site VPN 800000 700000 600000 500000 400000 300000 200000 100000 0 678255 134055 0 0 2000 4000 6000 Using the Cisco website calculator a comparison of three scenarios was made. Not for small enterprises!! Number of users * www.cisco.com/warp/public/779/largeent/learn/technologies/vpn/site2site.html
  • 19. VPN Directions Integration of VPN and firewall functions into a single device. Incorporating routing and quality of service features into the VPN device will make it even more versatile and more attractive to businesses. Adding intelligence to the network – Currently the routers and switches merely forward the packets without knowing what is inside them or how to process them accordingly. ??