Anda di halaman 1dari 25

Mahakal Institute Of Technology And Management

Seminar On

Virtual Private Networks


Submitted To: Presented By:

Prof. Sumit Jain Department C.S.E, MITM,Ujjain

KamalPreet Saluja Department CSE 0714CS121026

Contents:
Introduction: VPN
Traditional Connectivity Remote Access Virtual Private Network

Brief Overview of How it Works


Four Critical Functions Tunneling Four Protocols used in VPN

Contents:
VPN Topology : Type of VPNs
Remote Access VPN Site to site VPN

VPN Security

VPN : Advantages
VPN : Disadvantages Applications

Future Of VPN
References

Introduction: VPN
Linking of two or more computing devices to share
resources is networking.

Virtual Private Network is a type of private network that


uses public telecommunication, such as the Internet, instead of leased lines to communicate .

Traditional Connectivity

Remote Access Virtual Private Network

Brief Overview of How it Works


Two connections one is made to the Internet and the
second is made to the VPN.

Datagrams contains data, destination and source


information.

Firewalls VPNs allow authorized users to pass through the


firewalls.

Protocols protocols create the VPN tunnels.

Four Critical Functions


Authentication validates that the data was sent from the
sender.

Access control limiting unauthorized users from


accessing the network.

Confidentiality preventing the data to be read or copied


as the data is being transported.

Data Integrity ensuring that the data has not been altered

Tunneling
A virtual point-to-point connection made through a
public network. It transports encapsulated datagrams.
Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area

Data Encapsulation

Two types of end points: Remote Access Site-to-Site

Tunneling

Most VPNs rely on tunneling to create a private network


that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network.

Tunneling requires three different protocols:

Passenger protocol - The original data (IPX, IP) being


carried

Encapsulating protocol - The protocol (GRE, IPSec, L2F,


PPTP, L2TP) that is wrapped around the original data the information is traveling over

Carrier protocol - The protocol used by the network that

Four Protocols used in VPN


PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security

SOCKS is not used as much as the ones above

VPN Topology : Type of VPNs


Remote Access VPN Site-to-Site VPN
Intranet VPN Extranet VPN

Remote Access VPN


Remote-access, called as virtual private dial-up network
(VPDN)

LAN connection used by a company that has employees


who need to connect to the private network from various remote locations.

Remote-access VPNs permit secure encrypted

connections between a company's private network.

Site-to-Site VPN
Intranet-based - If a company has one or more remote locations
that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.

Extranet-based - When a company has a close relationship with


another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.

VPN Security
A well-designed VPN uses several methods for keeping your
connection and data secure:

Firewalls Encryption

IPSec
You can set firewalls to restrict the number of open ports, what type of
packets are passed through and which protocols are allowed through.

VPN : Advantages
Cost Savings .
Extend geographic connectivity. Improve security

Provide broadband networking compatibility


Improve productivity Reliable

VPN : Disadvantages
VPNs require an in-depth understanding of public network security
VPN require more tools.

Applications
Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged

Future Of VPN
VPNs are continually being enhanced.
Example: Equant NV

As the VPN market becomes larger, more applications


will be created along with more VPN providers and new VPN types.

Networks are expected to converge to create an


integrated VPN

Improved protocols are expected, which will also


improve VPNs.

Future of VPN: Companies with VPN

References:
http://vpn.shmoo.com/
http://www.uwsp.edu/it/vpn/ http://info.lib.uh.edu/services/vpn.html

http://www.cites.uiuc.edu/vpn/
http://www.positivenetworks.net/images/clientuploads/jumppage2.htm

References
<www.csun.edu/~vcact00f/311/termProjects/700class/VPN.ppt>
Mitchell, Bradley. "VPN Tutorial." About.Com. 2007. 8 Mar. 2007
<http://compnetworking.about.com/od/vpn/l/aa010701a.htm>.

Tyson, Jeff. "How Virtual Private Networks Work." How Stuff Works.
6 Mar. 2007 <http://computer.howstuffworks.com/vpn.htm>.

"Virtual Private Network." Wikipedia: the Free Encyclopedia. 6 Mar.


2007. 9 Mar. 2007 <http://en.wikipedia.org/wiki/Vpn>.

Anda mungkin juga menyukai