SlideShare a Scribd company logo
VPN WORKSHOP:
“From Basics to Setup”
(1)
UNDERSTANDING
VPN
What is VPN?
A network architecture for virtually extending a private network
across one or multiple other networks which are either untrusted
or need to be isolated
The internet is very similar to a postal delivery network!
The internet is very similar to a postal delivery network!
Courier Parcel Network Packets
Imagine that you are Malaysian SPY in the US who wants to deliver evidence and
report back to HQ…
From: BLUE
To: HQ
You can encrypt your package
in another language …
から: 自分
に: あなた
From: BLUE
To: WJPN
... language that could
only be understood by
a Branch office in
Japan
You can encrypt your package
in another language …
から: 自分
に: あなた
From: BLUE
To: WJPN
... language that could
only be understood by
a Branch office in
Japan
From: BLUE
To: WJPN
Put it inside another package,
destined to a Branch office in
Japan
から: 自分
に: あなた
From: #
To: #
From: #
To: #
The Japan Branch then
unbox it, decrypt it and
send the original
package safely to HQ
From: #
To: #
から: 自分
に: あなた
From: #
To: #
From: #
To: #
From: #
To: #
You can assume the
Japan Branch is your
home router
And HQ is your house
in Malaysia
The "tunnel" concept in VPNs refers to the
encrypted connection that is established
between your device and the VPN server.
Why normal people would use VPN?
1. Accessing a network securely while not on the premises
2. Using a public network securely
3. Tricking websites into thinking you are in a different
country
4. Avoiding government censorship and unblocking websites
Accessing a network securely while not on the
premises
Using public network securely
Tricking websites into thinking you are in a different
country
Site-to-Site VS Remote Access VPN
● This configuration joins one or
more computers to a network
which cannot be directly
connected
● Each client is in charge of
activating its own tunnel towards
the network it wants to join.
● Client software, SSL VPN
(browser-based)
1) Remote Access VPN
Site-to-Site VS Remote Access VPN
● Connect two networks together
● Encryption and decryption is done between two devices (routers / firewall /
servers)
1) Site-to-Site VPN
Common VPN Protocols
● PPTP Microsoft (1999)
● OpenVPN (2001)
● IKEv2 / IPsec (2005)
● SoftEther (2014)
● WireGuard (2016)
● Encryption
○ Advanced Encryption Standard (AES)
● Hashing
○ Secure Hashing Algorithm (SHA)
● Authentication
○ Preshared Keys or Certificates
● Anti-Replay
○ Assign serial numbers on packets
VPN security functions
(3)
HOSTING YOUR OWN
VPN
Residential Home Set Up
Your router needs to have a public IP
Home
Router
ISP / Internet
VPN
server
VPN
tunnel
Your
remote
device
Residential Home Set Up
If your Router is behind a CGNAT you are not reachable from your
vpn client, unless your ISP map a port forwarding to your router.
VPN
server
Home
Router
ISP
VPN
tunnel Your
remote
device
Internet
VPN SERVER IN THE CLOUD / VPS
Your
remote
device
VPN
server
ISP
Internet
(4)
SECURITY AND RISK
CONSIDERATIONS
As a consumer
● Trustworthiness and Privacy Concerns
● Malware and Fake VPNs
● Legal and Policy Considerations
When managing a self hosted VPN server
● Tunnel Segregation
● Device hardening
● More advanced and complicated authentication
methods
○ Multi-factor authentication
○ Digital Certificates
● Keep up with software patch and updates

More Related Content

PPTX
VPN.pptx
PPT
Design of a Virtual Private Network
PPTX
IPS NAT and VPN.pptx
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
PPT
Virtual private networks by darshana viduranga
PDF
online-module-guide.pdf
PPTX
Aryan_VPN_PPT.pptx
PPTX
VPN In Details
VPN.pptx
Design of a Virtual Private Network
IPS NAT and VPN.pptx
VPN, Its Types,VPN Protocols,Configuration and Benefits
Virtual private networks by darshana viduranga
online-module-guide.pdf
Aryan_VPN_PPT.pptx
VPN In Details

Similar to VPN WORKSHOP FROM BASICS TO SETUP SLIDES.pdf (20)

PPTX
Virtual Private Network
PPTX
VPN & FIREWALL
PPTX
IIT INDOR VPN AND NETWORK Security Control.pptx
PDF
Vpn security
PDF
Introduction to Virtual Private Network and Components
PPT
PPT
Blug Talk
PDF
Site to-multi site open vpn solution. with active directory auth
PDF
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
PDF
Site to-multi site open vpn solution with mysql db
PDF
Site-to-Site VPN (IPSec)--12345 Best.pdf
PDF
Vpn setup guide
PPTX
Insights of vpn
DOCX
Site to-multi site open vpn solution-latest
PDF
OpeVPN on Mikrotik
PDF
VPN (virtual private network)
PPT
Vpn " Virtual Private Network "
Virtual Private Network
VPN & FIREWALL
IIT INDOR VPN AND NETWORK Security Control.pptx
Vpn security
Introduction to Virtual Private Network and Components
Blug Talk
Site to-multi site open vpn solution. with active directory auth
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
Site to-multi site open vpn solution with mysql db
Site-to-Site VPN (IPSec)--12345 Best.pdf
Vpn setup guide
Insights of vpn
Site to-multi site open vpn solution-latest
OpeVPN on Mikrotik
VPN (virtual private network)
Vpn " Virtual Private Network "
Ad

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Machine Learning_overview_presentation.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
gpt5_lecture_notes_comprehensive_20250812015547.pdf
sap open course for s4hana steps from ECC to s4
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
20250228 LYD VKU AI Blended-Learning.pptx
Ad

VPN WORKSHOP FROM BASICS TO SETUP SLIDES.pdf

  • 3. What is VPN? A network architecture for virtually extending a private network across one or multiple other networks which are either untrusted or need to be isolated
  • 4. The internet is very similar to a postal delivery network!
  • 5. The internet is very similar to a postal delivery network!
  • 7. Imagine that you are Malaysian SPY in the US who wants to deliver evidence and report back to HQ… From: BLUE To: HQ
  • 8. You can encrypt your package in another language … から: 自分 に: あなた From: BLUE To: WJPN ... language that could only be understood by a Branch office in Japan
  • 9. You can encrypt your package in another language … から: 自分 に: あなた From: BLUE To: WJPN ... language that could only be understood by a Branch office in Japan From: BLUE To: WJPN Put it inside another package, destined to a Branch office in Japan
  • 10. から: 自分 に: あなた From: # To: # From: # To: # The Japan Branch then unbox it, decrypt it and send the original package safely to HQ From: # To: #
  • 11. から: 自分 に: あなた From: # To: # From: # To: # From: # To: # You can assume the Japan Branch is your home router And HQ is your house in Malaysia
  • 12. The "tunnel" concept in VPNs refers to the encrypted connection that is established between your device and the VPN server.
  • 13. Why normal people would use VPN? 1. Accessing a network securely while not on the premises 2. Using a public network securely 3. Tricking websites into thinking you are in a different country 4. Avoiding government censorship and unblocking websites
  • 14. Accessing a network securely while not on the premises
  • 16. Tricking websites into thinking you are in a different country
  • 17. Site-to-Site VS Remote Access VPN ● This configuration joins one or more computers to a network which cannot be directly connected ● Each client is in charge of activating its own tunnel towards the network it wants to join. ● Client software, SSL VPN (browser-based) 1) Remote Access VPN
  • 18. Site-to-Site VS Remote Access VPN ● Connect two networks together ● Encryption and decryption is done between two devices (routers / firewall / servers) 1) Site-to-Site VPN
  • 19. Common VPN Protocols ● PPTP Microsoft (1999) ● OpenVPN (2001) ● IKEv2 / IPsec (2005) ● SoftEther (2014) ● WireGuard (2016)
  • 20. ● Encryption ○ Advanced Encryption Standard (AES) ● Hashing ○ Secure Hashing Algorithm (SHA) ● Authentication ○ Preshared Keys or Certificates ● Anti-Replay ○ Assign serial numbers on packets VPN security functions
  • 22. Residential Home Set Up Your router needs to have a public IP Home Router ISP / Internet VPN server VPN tunnel Your remote device
  • 23. Residential Home Set Up If your Router is behind a CGNAT you are not reachable from your vpn client, unless your ISP map a port forwarding to your router. VPN server Home Router ISP VPN tunnel Your remote device Internet
  • 24. VPN SERVER IN THE CLOUD / VPS Your remote device VPN server ISP Internet
  • 26. As a consumer ● Trustworthiness and Privacy Concerns ● Malware and Fake VPNs ● Legal and Policy Considerations
  • 27. When managing a self hosted VPN server ● Tunnel Segregation ● Device hardening ● More advanced and complicated authentication methods ○ Multi-factor authentication ○ Digital Certificates ● Keep up with software patch and updates