WHAT IS VPN ?
VPN stands for Virtual Private Network
A private network that uses a public network
(usually the Internet) to connect remote sites.
It’s a form of Wide Area Network
CONT...
History of VPN
Earlier Leased Lines such as ISDN were
used for Wide Area Networks(WAN)
Then came INTRANET
VPN came to be used to accommodate the
needs of remote offices
HOW VPN WORKS ...
How VPN Works
Tunneling
Virtual private network technology is based on the idea
of tunneling.
VPN tunneling involves establishing and maintaining a
logical network connection.
On this connection, packets constructed in a specific VPN
protocol format are encapsulated within some other
base or carrier protocol, then transmitted between VPN
client and server, and finally de-encapsulated on the
receiving side.
VPN protocols also support authentication and
encryption to keep the tunnels secure
Tunneling
The truck is the carrier protocol, the box is the encapsulating protocol and the
computer is the passenger protocol.
Types of VPN
VIRTUAL PRIVATE NETWORK POINT-TO-POINT
SITE-TO-SITE
VIRTUAL PRIVATE DIAL-UP
INTRANET BASED NETWORK(VPDN)
EXTRANET BASED
Virtual Private Dial-Up Network
Also known as Remote Access
Is a User to LAN connection used by a company
Software based VPN System which uses existing Internet
connection.
Uses encryption methods to send out the data.
Cheaper version of VPN.
Site-to-Site VPN
Two types-Intranet based & Extranet based
Intranet based -For one or more remote locations
Intranet VPN connects LAN to LAN
Extranet based -For partner companies
Allows existence of shared environment
Point to Point VPN
These are also called Leased line VPN.
Direct point to point connection.
Very much expensive.
Diagrammatic Representation:
VPN SECURITY
ENCRYPTION
IP SEC
VPN
SECURITY
FIREWALLS
VPN SECURITY: FIREWALLS
Provides a strong barrier between private network and internet
Used for restricting open ports,type of packets passed through &
protocols allowed
Good firewall essential before installing VPN
Firewalls used for terminating VPN sessions
VPN SECURITY : IPSec
ABOUT IPSec :
Provides better security features
Encryption Algorithms & More comprehensive authentication are added
features
Two encryption modes: Tunnel & Transport
Tunnel: Encrypts header and payload of each packet
Transport: Encrypts only payload
Devices must use a common key and firewalls of each network must have
similar security policies
VPN SECURITY:ENCRYPTION :
Process in which data taken from one computer is encoded into a
form readable by destination computer only
Classified in two types:
ENCRYPTION
SYYMETRIC KEY PUBLIC KEY
SYMMETRIC KEY ENCRYPTION :
Each computer has a secret code that is used to encrypt a packet of
information
Code is then transmitted to the other computer
Key requirement is to know which computers will be talking to each
other
Code provides the method of decoding the message
PUBLIC KEY ENCRYPTION :
Combination of Private key and Public key
Private key is known only to host computer
Public key is given by host computer to any computer with which it
wants to securely connect
For decoding the message public key is required along with the
receiver`s own private key.
BUSINESS PROSPECTIVE
IT Industry
Hotels
Banking
ERP(Enterprise resource planning)
APPLICATIONS
B2B-Business-to-business applications with customers,
suppliers and partners
VoIP for enterprises looking for converged services
rather than having a separate PSTN-Public switched
telephone network.
Teleworkers who work from outside the office premises.
Wireless VPN
Storage Area Networks setup by large corporations
EAI - Enterprise Application Integration for web based
CRM
Advantages of VPN
Eliminating the need for expensive long-distance leased lines
Reducing long-distance telephone charges
Offloading support costs
Extend geographic connectivity
Improve security
Reduce operational costs versus traditional WAN
Reduce transit time and transportation costs for remote users
Improve productivity
Simplify network topology
Provide global networking opportunities
Provide telecommuter support
Provide broadband networking compatibility
Provide faster ROI (return on investment) than traditional WAN
Limitations of VPN
1. VPNs require detailed understanding of network
security issues.
2. It needs careful installation / configuration to ensure
sufficient protection on a public network like the Internet.
3. The reliability and performance of an Internet-based
VPN is not under an organization's direct control.
4. VPN products and solutions from different vendors
have not been compatible, hence creating complexities.
FUTURE ...
VPN is the answer to WAN – cost effective
solution to private leased lines.
VPN is more trusted than the internet.
CONCLUSION
Efficient tool in transferring data
Best way to connect remote areas
Secured networking provided for the users
Very cost effective
REFERENCES
ANY QUERY?
ANY DOUBT?