SlideShare a Scribd company logo
4
Most read
6
Most read
9
Most read
VPN: Virtual Private
Network
Advanced networks
What is VPN?
A Virtual Private Network (VPN) is a network
technology that creates a secure network
connection over a public network such as the
Internet or a private network owned by a service
provider. Large corporations, educational
institutions, and government agencies use VPN
technology to enable remote users to securely
connect to a private network.
4/3/2015 2
What is VPN?
In the virtual network, the link layer protocols are
tunneled through the larger network. VPNs provide
secure communications over the shared public
network, which is the Internet. They are also used for
separating IP traffic over the network using security
features. By using a VPN, users can access a network
through a different IP address other than the one
connecting their computers and the Internet. In virtual
private networking, there is a private network
configured within a shared public network to avail of
the benefits enjoyed by large networks.
4/3/2015 3
4/3/2015 4
Brief Overview of How it
Works
oTwo connections – one is made to the Internet
and the second is made to the VPN.
oDatagrams – contains data, destination and
source information.
oFirewalls – VPNs allow authorized users to pass
through the firewalls.
oProtocols – protocols create the VPN tunnels.
4/3/2015 5
Four Critical Functions
oAuthentication – validates that the data was
sent from the sender.
oAccess control – limiting unauthorized users
from accessing the network.
oConfidentiality – preventing the data to be read
or copied as the data is being transported.
oData Integrity – ensuring that the data has not
been altered
4/3/2015 6
Tunneling
A virtual point-to-point connection made through a
public network. It transports encapsulated datagrams.
Encrypted Inner Datagram
Datagram Header Outer Datagram Data
Area
Original Datagram
Data Encapsulation [From Comer]
4/3/2015 7
4/3/2015 8
Four Protocols used in VPN
1. PPTP -- Point-to-Point Tunneling Protocol
Used to connect a remote client to a private server over
the Internet.
2. L2TP -- Layer 2 Tunneling Protocol
Used to tunnel data communications traffic between two
sites over the Internet.
3. IPsec -- Internet Protocol Security
Used to secure communications over the Internet.
4. SSL and TLS -- Secure Sockets Layer (SSL) and Transport
Layer Security (TLS)
use cryptography to secure communications over the4/3/2015 9
4/3/2015 10

More Related Content

PPTX
Vpn(virtual private network)
sonangrai
 
PPT
data-link layer protocols
BE Smârt
 
PDF
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
PPTX
Ip address
Robin Sedeqi
 
PPTX
Automatic Street Light Controller Using Arduino
sachin achari
 
PPTX
Machine learning
Navdeep Asteya
 
PPT
waste water treatment ppt
Nusrat Bashir
 
PPT
System unit
Dhani Ahmad
 
Vpn(virtual private network)
sonangrai
 
data-link layer protocols
BE Smârt
 
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Ip address
Robin Sedeqi
 
Automatic Street Light Controller Using Arduino
sachin achari
 
Machine learning
Navdeep Asteya
 
waste water treatment ppt
Nusrat Bashir
 
System unit
Dhani Ahmad
 

What's hot (20)

PPTX
Virtual Private Network(VPN)
Abrish06
 
PPT
Virtual private network
Sowmia Sathyan
 
PDF
Vpn ppt
Nikhila Pothukuchi
 
PPT
Virtual Private Network main
Kanika Gupta
 
PPT
Vpn presentation
Kuldeep Padhiyar
 
PPT
Virtual Private Network
Rajan Kumar
 
PPT
Virtual Private Network (VPN).
Debasis Chowdhury
 
PPT
VPN
Shiraz316
 
PPTX
Virtual Private Network
Rajendra Dangwal
 
PPT
Vpn
Nure Alam
 
PPTX
network monitoring system ppt
ashutosh rai
 
PPT
Secure shell ppt
sravya raju
 
PPTX
Virtual private networks (vpn)
Avinash Nath
 
PPTX
Software Defined Network - SDN
Venkata Naga Ravi
 
PPTX
IPSec VPN & IPSec Protocols
NetProtocol Xpert
 
PPTX
Dhcp ppt
Hema Dhariwal
 
PPTX
Firewall
Saurabh Chauhan
 
PPTX
Firewall presentation
gaurav96raj
 
PPT
Firewall & its configurations
Student
 
Virtual Private Network(VPN)
Abrish06
 
Virtual private network
Sowmia Sathyan
 
Virtual Private Network main
Kanika Gupta
 
Vpn presentation
Kuldeep Padhiyar
 
Virtual Private Network
Rajan Kumar
 
Virtual Private Network (VPN).
Debasis Chowdhury
 
Virtual Private Network
Rajendra Dangwal
 
network monitoring system ppt
ashutosh rai
 
Secure shell ppt
sravya raju
 
Virtual private networks (vpn)
Avinash Nath
 
Software Defined Network - SDN
Venkata Naga Ravi
 
IPSec VPN & IPSec Protocols
NetProtocol Xpert
 
Dhcp ppt
Hema Dhariwal
 
Firewall
Saurabh Chauhan
 
Firewall presentation
gaurav96raj
 
Firewall & its configurations
Student
 
Ad

Viewers also liked (20)

PPTX
VPN Virtual Private Network
Rama Krishna Nakka
 
PPTX
What Is VPN
SwitchVPN
 
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
PDF
VPN - Virtual Private Network
Peter R. Egli
 
PPT
Vpn presentation
stolentears
 
DOC
53415140 a-paper-presentation-on-wimax
Suneel Dogra
 
PPTX
Man (metropolitan area network)
mizus
 
PPT
BrainFingerprintingpresentation
KITE www.kitecolleges.com
 
PDF
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
 
PPT
Distributed Interactive Computing Environment (DICE)
The HDF-EOS Tools and Information Center
 
PPT
4 vpn s
Swarup Kumar Mall
 
PPT
Electronic Instrumentation Virtual Laboratory
gmeneses23
 
PPTX
Metropolitan Area Network (MAN)
adwikumaidityantoro
 
PPT
DISTRIBUTED INTERACTIVE VIRTUAL ENVIRONMENT
KITE www.kitecolleges.com
 
PPT
Vpn networks kami
kamran_share
 
PPT
Anonymous Connections And Onion Routing
Ali Habeeb
 
TXT
Seminartopics.docx
Mit Thakkar
 
PPT
Vpn Virtual Private Network
faisalmalik
 
VPN Virtual Private Network
Rama Krishna Nakka
 
What Is VPN
SwitchVPN
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
VPN - Virtual Private Network
Peter R. Egli
 
Vpn presentation
stolentears
 
53415140 a-paper-presentation-on-wimax
Suneel Dogra
 
Man (metropolitan area network)
mizus
 
BrainFingerprintingpresentation
KITE www.kitecolleges.com
 
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
 
Distributed Interactive Computing Environment (DICE)
The HDF-EOS Tools and Information Center
 
Electronic Instrumentation Virtual Laboratory
gmeneses23
 
Metropolitan Area Network (MAN)
adwikumaidityantoro
 
DISTRIBUTED INTERACTIVE VIRTUAL ENVIRONMENT
KITE www.kitecolleges.com
 
Vpn networks kami
kamran_share
 
Anonymous Connections And Onion Routing
Ali Habeeb
 
Seminartopics.docx
Mit Thakkar
 
Vpn Virtual Private Network
faisalmalik
 
Ad

Similar to Virtual Private Network VPN (20)

PPTX
VPN In Details
Humza Sajid
 
PPT
Vp npresentation 2
Swarup Kumar Mall
 
PPTX
Virtual Private Network
adeelahmed0345
 
PPTX
Vpn
surendrabane
 
PDF
Lan Virtual Networks
Nicole Gomez
 
PPTX
Virtual Private Network- VPN
Nikhil Kumar
 
PDF
Husky VPN.pdf
Vograce
 
PDF
A depth detail about vpn security
Eric Fedewa
 
PPTX
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
DOCX
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
PPTX
WLAN:VPN Security
@zenafaris91
 
PDF
Introduction to Virtual Private Network and Components
JhonFrancisDuarte
 
PDF
Virtual private networks
UBT - Higher Education Institution
 
PPT
Virtual private network feature and benefits
Anthony Daniel
 
PPTX
Insights of vpn
Harshika Rana
 
PPTX
Virtual private network(vpn)
sonalikasingh15
 
PPTX
Virtual Private Network
HASHIR RAZA
 
DOC
Virtual private network
Parth Akbari
 
DOC
Virtual private network
Ayano Midakso
 
VPN In Details
Humza Sajid
 
Vp npresentation 2
Swarup Kumar Mall
 
Virtual Private Network
adeelahmed0345
 
Lan Virtual Networks
Nicole Gomez
 
Virtual Private Network- VPN
Nikhil Kumar
 
Husky VPN.pdf
Vograce
 
A depth detail about vpn security
Eric Fedewa
 
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
WLAN:VPN Security
@zenafaris91
 
Introduction to Virtual Private Network and Components
JhonFrancisDuarte
 
Virtual private networks
UBT - Higher Education Institution
 
Virtual private network feature and benefits
Anthony Daniel
 
Insights of vpn
Harshika Rana
 
Virtual private network(vpn)
sonalikasingh15
 
Virtual Private Network
HASHIR RAZA
 
Virtual private network
Parth Akbari
 
Virtual private network
Ayano Midakso
 

More from Farah M. Altufaili (10)

PDF
A Correlative Information-Theoretic Measure for Image Similarity
Farah M. Altufaili
 
PPTX
Fp growth
Farah M. Altufaili
 
PPTX
Stereo vision
Farah M. Altufaili
 
PPT
Writing a good cv
Farah M. Altufaili
 
PPTX
Fuzzy image processing- fuzzy C-mean clustering
Farah M. Altufaili
 
PPTX
Principal component analysis
Farah M. Altufaili
 
PPTX
Tiny encryption algorithm
Farah M. Altufaili
 
PPTX
Polygon mesh
Farah M. Altufaili
 
PPTX
Nanotechnology and its impact on modern computer
Farah M. Altufaili
 
PPTX
Adversarial search
Farah M. Altufaili
 
A Correlative Information-Theoretic Measure for Image Similarity
Farah M. Altufaili
 
Stereo vision
Farah M. Altufaili
 
Writing a good cv
Farah M. Altufaili
 
Fuzzy image processing- fuzzy C-mean clustering
Farah M. Altufaili
 
Principal component analysis
Farah M. Altufaili
 
Tiny encryption algorithm
Farah M. Altufaili
 
Polygon mesh
Farah M. Altufaili
 
Nanotechnology and its impact on modern computer
Farah M. Altufaili
 
Adversarial search
Farah M. Altufaili
 

Recently uploaded (20)

PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 

Virtual Private Network VPN

  • 2. What is VPN? A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network. 4/3/2015 2
  • 3. What is VPN? In the virtual network, the link layer protocols are tunneled through the larger network. VPNs provide secure communications over the shared public network, which is the Internet. They are also used for separating IP traffic over the network using security features. By using a VPN, users can access a network through a different IP address other than the one connecting their computers and the Internet. In virtual private networking, there is a private network configured within a shared public network to avail of the benefits enjoyed by large networks. 4/3/2015 3
  • 5. Brief Overview of How it Works oTwo connections – one is made to the Internet and the second is made to the VPN. oDatagrams – contains data, destination and source information. oFirewalls – VPNs allow authorized users to pass through the firewalls. oProtocols – protocols create the VPN tunnels. 4/3/2015 5
  • 6. Four Critical Functions oAuthentication – validates that the data was sent from the sender. oAccess control – limiting unauthorized users from accessing the network. oConfidentiality – preventing the data to be read or copied as the data is being transported. oData Integrity – ensuring that the data has not been altered 4/3/2015 6
  • 7. Tunneling A virtual point-to-point connection made through a public network. It transports encapsulated datagrams. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram Data Encapsulation [From Comer] 4/3/2015 7
  • 9. Four Protocols used in VPN 1. PPTP -- Point-to-Point Tunneling Protocol Used to connect a remote client to a private server over the Internet. 2. L2TP -- Layer 2 Tunneling Protocol Used to tunnel data communications traffic between two sites over the Internet. 3. IPsec -- Internet Protocol Security Used to secure communications over the Internet. 4. SSL and TLS -- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over the4/3/2015 9

Editor's Notes

  • #10: Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used to connect a remote client to a private server over the Internet. PPTP is one of the most widely used VPN protocols because of it's straightforward configuration and maintenance and also because it is included with the Windows operating system. Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data communications traffic between two sites over the Internet. L2TP is often used in tandem with IPSec (which acts as a security layer) to secure the transfer of L2TP data packets over the Internet. Unlike PPTP, a VPN implementation using L2TP/IPSec requires a shared key or the use of certificates. IP security (IPSec) is used to secure communications over the Internet. IPSec traffic can use either transport mode or tunneling to encrypt data traffic in a VPN. The difference between the two modes is that transport mode encrypts only the message within the data packet (also known as the payload) while tunneling encrypts the entire data packet. IPSec is often referred to as a "security overlay" because of its use as a security layer for other protocols. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over the Internet. Both protocols use a "handshake" method of authentication that involves a negotiation of network parameters between the client and server machines. To successfully initiate a connection, an authentication process involving certificates is used. Certificates are cryptographic keys that are stored on both the server and client.