0% found this document useful (0 votes)
34 views10 pages

VPN Types and Security Guide

Uploaded by

fhvsq9bv69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views10 pages

VPN Types and Security Guide

Uploaded by

fhvsq9bv69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Virtual privet network

(VPN)

Tawfiq Ashqer
Mohammed Khattab
Virtual Private Network
• Virtual Private Network is a
Type of private network that
Uses public telecommunication,
Such as the Internet, instead of
Leased lines to communicate.

• Became popular as more


Employees worked in remote
Locations.

• Teminologies to understand
How VPNs work.
Types of VPN’s
1. Remote-Access VPN

2. Site-to-Site VPN (intranet-based)

3. Site-to-Site VPN (Extranet-based)


Remote-Access VPN
• A remote access VPN is for home or travelling users who
need to access their central LAN from a remote location.

• They dial their ISP and connect over the internet to the
LAN.

• This is made possible by installing a client software


program on the remote user’s laptop or PC that deals
with the encryption and decryption of the VPN traffic
between itself and the VPN gateway on the central LAN.
Site-to-Site VPN
• Intranet –based-If a company has one or more remote
locations that they wish to join in a single private
network, they can create an intranet VPN to connect
LAN to LAN.

• Extranet-based - When a company has a close


relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that allows
all of the various companies to work in a shared
environment.
Protocols used in VPN
• PPTP - Point-to-point tunneling protocol
• L2Tp – Layers to Tunneling Protocol
• IPSec - Internet protocol security
• SSL – is not used as much as the ones above.
• Encryption
VPN Security: Firewall
A well-designed VPN uses several methods for keeping your connection
and data secure:
• Firewalls
• Encryption
• IPSec
• AAA Server

• You can set firewalls to restrict the number of open ports, what type
of packets are passed through and which protocols are allowed
through.
VPN Advantages
• Multiple telephone lines and banks of modems at the central site are
not required.
• A reduction in the overall telecommunication infrastructure – as the
ISP provides the bulk of the network.
• Reduced cost of management, maintenance of equipment and
technical support.
• Simplifies network topology by eliminating modem pools and a
private network infrastructure.
• VPN functionality is already present in some IT equipment.
VPN Disadvantage
• If the ISP or Internet connection is down, so is the VPN.
• The central site must have a permanent internet connection so that
remote clients and other sites can connect at anytime.
• VPNs may provide each user with less bandwidth than a dedicated
line solution.
• Existing firewalls, proxies, routers and hubs may not support VPN
transmissions.
VPN Features
• Security – tunneling support between sites with at least 128bit
encryption of the data.
• Scalability – extra users and bandwidth can be added easily to adapt
to new requirements.
• Services – quality of service features, including bandwidth,
management and traffic shaping, are important to avoid congestion.
• Management – reports on user activity, management of user policies
and monitoring of the VPN as a whole.

You might also like