Upload
apex-tgi
View
13
Download
2
Tags:
Embed Size (px)
DESCRIPTION
A virtual private network that is established over, in general, the InternetIt is virtual because it exists as a virtual entity within a public networkIt is private because it is confined to a set of private users
Citation preview
What is Virtual Private Network Introduction to VPN
ByApex TG India Pvt Ltdhttp://www.apextgi.in
http://www.apextgi.in/
VPN
A virtual private network that is established over, in general, the Internet
It is virtual because it exists as a virtual entity within a public network
It is private because it is confined to a set of private users
Why is it a Virtual Private Network?
From the users perspective, it appears as a network consisting of dedicated network links
These links appear as if they are reserved for the VPN clientele
Because of encryption, the network appears to be private
Tunnel and Connections
Tunnel The portion of the network where the data
is encapsulated Connection
The portion of the network where the data is encrypted
VPN Major Characteristics
Must emulate a point-to-point link Done by encapsulating the data that would
facilitate allow it to travel the Internet to reach the end point
Must emulate a private link Done by encrypting the data in the data
packets
Typical VPN Connection
Tunnel and Connections
Tunnel The portion of the network where the data
is encapsulated Connection
The portion of the network where the data is encrypted
Application Areas
In general, provide users with connection to the corporate network regardless of their location
The alternative of using truly dedicated lines for a private network are expensive propositions
Some Common Uses of VPN
Provide users with secured remote access over the Internet to corporate resources
Connect two computer networks securely over the Internet Example: Connect a branch office network to the
network in the head office Secure part of a corporate network for security
and confidentiality purpose
Remote Access Over the Internet
Connecting Two Computer Networks Securely
Securing a Part of the Corporate Network
Basic VPN Requirements
User Authentication Address Management Data Encryption Key Management Multi-protocol Support
User Authentication
VPN must be able to verify user authentication and allow only authorized users to access the network
Address Management
Assign addresses to clients and ensure that private addresses are kept private on the VPN
Data Encryption
Encrypt and decrypt the data to ensure that others on the not have access to the data
Key Management
Keys must be generated and refreshed for encryption at the server and the client
Note that keys are required for encryption
Multi-protocol Support
The VPN technology must support commons protocols on the Internet such as IP, IPX etc.
Thanks
Say Connected for more chapters on VPN
Follow us on
Facebook Twitter Google+
https://www.facebook.com/pages/ApexTgi-Pvt-Ltd/353478941333744https://twitter.com/ApextgiNoidahttps://plus.google.com/b/116818519717421915276/+ApexTGIndiaPvtLtdNoida/posts
Slide 1VPNWhy is it a Virtual Private Network?Tunnel and ConnectionsVPN Major CharacteristicsSlide 7Application AreasSome Common Uses of VPNRemote Access Over the InternetConnecting Two Computer Networks SecurelySecuring a Part of the Corporate NetworkBasic VPN RequirementsUser AuthenticationAddress ManagementData EncryptionKey ManagementMulti-protocol SupportSlide 19