SlideShare a Scribd company logo
Netmetric Solutions
                       ( Meer Shahanawaz ) ( Abdullah )




                              VPN Definition
Virtual Private Network. A network which uses the public network to transfer
information using secure methods. For example, you could set up a VPN between
your home office and your business office using security and encryption and the
Internet as your transfer pipe.

VPN is used to make the communication between two private networks over the
Internet.




A VPN carris private traffic over a public network using advanced encryption and
tunnels to protect:
       .Confentiality of Information
              .integrity of data
                      .Authentication of users

 A VPN is used to make the tunnel between two private netwoks over the
internet.
            . A tunnel is a virtual point-point connection.
                   . The tunnel carries one protocol inside another protocol
                            . Encryption transforms content information into
ciphertext                         . Decryption restores content information from
ciphertext

Types of VPN
     1.Site to Site VPN                2.Remote Access VPN

VPN with different Host
       1.PC ( Host ) to PC (Host )      2.PC (Host) to       Router
                         3.Router to     Router                 4.Router   to
Firewall                       5.Firewall to    Firewall




1.VPN used the protocols to make the tunnel , such as
             PPTP    Point to Point Protocol
                   L2TP     Layer 2 Tunneling Protocol
                          IPSEC Internet Protocol Security




2.VPN   used to make the Gateway to Gateway to communication
3.VPN is used to encrypt the using some public or private key , so that only
authorized users is able to decrypt the communication.




                                       PPTP        Definition

                Point-to-Point Tunneling Protocol, a new technology for creating
Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S.
Robotics, and several remote access vendor companies, known collectively as the
PPTP Forum. A VPN is a private network of computers that uses the public Internet to
connect some nodes. Because the Internet is essentially an open network, the Point-
to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from
one VPN node to another are secure. With PPTP, users can dial in to their corporate
network via the Internet.

                                        L2TP       Definition



Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate
Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP
from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the
protocol.




                                           IP SECURITY


Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the
IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs).
IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion
(payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the
header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.

For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through
a protocol known as Internet Security Association and Key Management Protocol/Oakley
(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using
digital certificates

More Related Content

PPTX
Types of VPN
PPTX
Virtual Private Network
PPTX
Vpn-Virtual Private Network
PPT
Vpn Virtual Private Network
PPTX
Virtual private network(vpn)
PPT
Virtual private networks by darshana viduranga
PPT
Virtual Private Network main
PPTX
L2 tp., ip sec
Types of VPN
Virtual Private Network
Vpn-Virtual Private Network
Vpn Virtual Private Network
Virtual private network(vpn)
Virtual private networks by darshana viduranga
Virtual Private Network main
L2 tp., ip sec

What's hot (20)

PPT
Vpn networks kami
PPTX
Virtual Private Network
PPTX
Mpls based vpn connectivity
PPTX
Virtual Private Network
PPTX
Iot protocols seminar
PDF
PPTX
Understanding of MQTT for IoT Projects
PDF
VPN - Virtual Private Network
PPT
Virtual Private Network
PPTX
VPN presentation
PDF
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
PDF
VPN - Virtual Private Network
PPTX
MQTT (Message Queue Telemetry Transport)
PDF
VPN Theory
PPTX
Virtual Private Network- VPN
PPTX
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
PPTX
VPN Network
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
Vpn networks kami
Virtual Private Network
Mpls based vpn connectivity
Virtual Private Network
Iot protocols seminar
Understanding of MQTT for IoT Projects
VPN - Virtual Private Network
Virtual Private Network
VPN presentation
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
VPN - Virtual Private Network
MQTT (Message Queue Telemetry Transport)
VPN Theory
Virtual Private Network- VPN
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
VPN Network
VPN, Its Types,VPN Protocols,Configuration and Benefits
Ad

Viewers also liked (20)

DOC
Updated registration packet2010
RTF
written shot by shot
PDF
הסוזן התוכנית לחטוף את בגין
PPTX
Replacing Rounds PSA Stonaker
PDF
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
PPT
Retrospectiva primului an de participare la Programul BIBLIONET
DOCX
Ujian koko 2013
PDF
2merchan
PDF
DOCX
PDF
שיעור שתיים מעבד התמלילים
PPTX
Interacciones de quimioterapia y radioterapia
RTF
Exchange server
PDF
Tdr prezentacija rezultata bi h 03.06.2104-no-products
PDF
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
PDF
PPT
Estonia Power Point
PPT
Global Trends in Open Educational Resources
PPS
Vietnam paisatges
Updated registration packet2010
written shot by shot
הסוזן התוכנית לחטוף את בגין
Replacing Rounds PSA Stonaker
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
Retrospectiva primului an de participare la Programul BIBLIONET
Ujian koko 2013
2merchan
שיעור שתיים מעבד התמלילים
Interacciones de quimioterapia y radioterapia
Exchange server
Tdr prezentacija rezultata bi h 03.06.2104-no-products
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Estonia Power Point
Global Trends in Open Educational Resources
Vietnam paisatges
Ad

Similar to Vpn (20)

PDF
Review on Protocols of Virtual Private Network
PPTX
WLAN:VPN Security
PPT
Vpn presentation
PPT
V P N
PPT
Vpn_NJ ppt
PPT
Shradhamaheshwari vpn
PPT
Vp npresentation 2
PPTX
Virtual Private Network
PPTX
Virtual Private Network(VPN)
DOC
Virtual private network
PPTX
Virtual private network
PDF
online-module-guide.pdf
PPTX
Presentation vpn
PPT
Virtual private network
DOCX
Describe the major types of VPNs and technologies- protocols- and serv.docx
PPTX
Virtual Private Network VPN
PDF
A depth detail about vpn security
PDF
Vpn security
Review on Protocols of Virtual Private Network
WLAN:VPN Security
Vpn presentation
V P N
Vpn_NJ ppt
Shradhamaheshwari vpn
Vp npresentation 2
Virtual Private Network
Virtual Private Network(VPN)
Virtual private network
Virtual private network
online-module-guide.pdf
Presentation vpn
Virtual private network
Describe the major types of VPNs and technologies- protocols- and serv.docx
Virtual Private Network VPN
A depth detail about vpn security
Vpn security

More from proser tech (18)

PDF
New search engine Alternative for Google..
DOCX
Windows profile
DOCX
Windows xp services
PDF
Outlook Express
DOC
Double routing
DOC
Certification authority
DOC
Active directory domain and trust
DOCX
Windows xp services
DOCX
Windows profile
DOCX
Windows profile how do i
DOCX
Network printer
DOCX
A z index of the windows cmd command line
PDF
Difference between ntfs and fat32
PDF
Excell shortcuts
PDF
Windows xp tips
PDF
Xlshortcuts07
PDF
Pavan Gadey Marriage Invitation Card
PPTX
SpN corporate PPt
New search engine Alternative for Google..
Windows profile
Windows xp services
Outlook Express
Double routing
Certification authority
Active directory domain and trust
Windows xp services
Windows profile
Windows profile how do i
Network printer
A z index of the windows cmd command line
Difference between ntfs and fat32
Excell shortcuts
Windows xp tips
Xlshortcuts07
Pavan Gadey Marriage Invitation Card
SpN corporate PPt

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm

Vpn

  • 1. Netmetric Solutions ( Meer Shahanawaz ) ( Abdullah ) VPN Definition Virtual Private Network. A network which uses the public network to transfer information using secure methods. For example, you could set up a VPN between your home office and your business office using security and encryption and the Internet as your transfer pipe. VPN is used to make the communication between two private networks over the Internet. A VPN carris private traffic over a public network using advanced encryption and tunnels to protect: .Confentiality of Information .integrity of data .Authentication of users A VPN is used to make the tunnel between two private netwoks over the internet. . A tunnel is a virtual point-point connection. . The tunnel carries one protocol inside another protocol . Encryption transforms content information into ciphertext . Decryption restores content information from ciphertext Types of VPN 1.Site to Site VPN 2.Remote Access VPN VPN with different Host 1.PC ( Host ) to PC (Host ) 2.PC (Host) to Router 3.Router to Router 4.Router to Firewall 5.Firewall to Firewall 1.VPN used the protocols to make the tunnel , such as PPTP Point to Point Protocol L2TP Layer 2 Tunneling Protocol IPSEC Internet Protocol Security 2.VPN used to make the Gateway to Gateway to communication
  • 2. 3.VPN is used to encrypt the using some public or private key , so that only authorized users is able to decrypt the communication. PPTP Definition Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. A VPN is a private network of computers that uses the public Internet to connect some nodes. Because the Internet is essentially an open network, the Point- to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. L2TP Definition Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the protocol. IP SECURITY Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs).
  • 3. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates