Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

VPN Presentation

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 15
At a glance
Powered by AI
The key takeaways are that a VPN allows private network connections over public networks like the internet through encryption and tunneling. It provides functions like authentication, access control, confidentiality and data integrity.

The main components of a VPN are protocols, which create encrypted tunnels between endpoints. Protocols include IPsec, PPTP, and L2TP. VPNs also use firewalls, authentication, and encryption.

The main protocols used in VPNs are IPsec, PPTP, and L2TP. IPsec can operate in transport or tunnel mode, PPTP uses PPP, and L2TP exists at the data link layer and is composed of PPTP and L2F.

VIRTUAL PRIVATE NETWORK

Introduction: What is a VPN?


Virtual Private Network

Traditional Connectivity

What is VPN?
Virtual Private Network is a type of private

network that uses public telecommunication, such as the Internet, instead of leased lines to communicate.
A VPN enables you to send data between two

computers across a shared or public internetwork.

Remote Access Virtual Private Network

Brief Overview of How it Works


Two connections one is made to the Internet and

the second is made to the VPN. Firewalls VPNs allow authorized users to pass through the firewalls. Protocols protocols create the VPN tunnels.

Four Critical Functions


Authentication validates that the data was sent from

the sender. Access control limiting unauthorized users from accessing the network. Confidentiality preventing the data to be read or copied as the data is being transported. Data Integrity ensuring that the data has not been altered

Encryption
Encryption -- is a method of scrambling data

before transmitting it onto the Internet.


Public Key Encryption Technique
Digital signature for authentication

Tunneling
A virtual point-to-point connection made through a public network. It transports encapsulated datagrams.
Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area

Data Encapsulation [From Comer]

Two types of end points: Remote Access Site-to-Site

Four Protocols used in VPN


PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security

VPN Components: Protocols


IP Security (IPSec) Transport mode Tunnel mode
Point-to-Point Tunneling Protocol (PPTP) Voluntary tunneling method Uses PPP (Point-to-Point Protocol)

VPN Components: Protocols


Layer 2 Tunneling Protocol (L2TP) Exists at the data link layer of OSI Composed from PPTP and L2F (Layer 2 Forwarding) Compulsory tunneling method

VPN Encapsulation of Packets

Types of Implementations
What does implementation mean in VPNs? 3 types

Intranet Within an organization Extranet Outside an organization Remote Access Employee to Business

Basic Architecture

You might also like