What is Virtual Private Network - VPN

19
What is Virtual Private Network Introduction to VPN By Apex TG India Pvt Ltd http://www.apextgi.in

description

A virtual private network that is established over, in general, the InternetIt is virtual because it exists as a virtual entity within a public networkIt is private because it is confined to a set of private users

Transcript of What is Virtual Private Network - VPN

  • What is Virtual Private Network Introduction to VPN

    ByApex TG India Pvt Ltdhttp://www.apextgi.in

    http://www.apextgi.in/

  • VPN

    A virtual private network that is established over, in general, the Internet

    It is virtual because it exists as a virtual entity within a public network

    It is private because it is confined to a set of private users

  • Why is it a Virtual Private Network?

    From the users perspective, it appears as a network consisting of dedicated network links

    These links appear as if they are reserved for the VPN clientele

    Because of encryption, the network appears to be private

  • Tunnel and Connections

    Tunnel The portion of the network where the data

    is encapsulated Connection

    The portion of the network where the data is encrypted

  • VPN Major Characteristics

    Must emulate a point-to-point link Done by encapsulating the data that would

    facilitate allow it to travel the Internet to reach the end point

    Must emulate a private link Done by encrypting the data in the data

    packets

  • Typical VPN Connection

  • Tunnel and Connections

    Tunnel The portion of the network where the data

    is encapsulated Connection

    The portion of the network where the data is encrypted

  • Application Areas

    In general, provide users with connection to the corporate network regardless of their location

    The alternative of using truly dedicated lines for a private network are expensive propositions

  • Some Common Uses of VPN

    Provide users with secured remote access over the Internet to corporate resources

    Connect two computer networks securely over the Internet Example: Connect a branch office network to the

    network in the head office Secure part of a corporate network for security

    and confidentiality purpose

  • Remote Access Over the Internet

  • Connecting Two Computer Networks Securely

  • Securing a Part of the Corporate Network

  • Basic VPN Requirements

    User Authentication Address Management Data Encryption Key Management Multi-protocol Support

  • User Authentication

    VPN must be able to verify user authentication and allow only authorized users to access the network

  • Address Management

    Assign addresses to clients and ensure that private addresses are kept private on the VPN

  • Data Encryption

    Encrypt and decrypt the data to ensure that others on the not have access to the data

  • Key Management

    Keys must be generated and refreshed for encryption at the server and the client

    Note that keys are required for encryption

  • Multi-protocol Support

    The VPN technology must support commons protocols on the Internet such as IP, IPX etc.

  • Thanks

    Say Connected for more chapters on VPN

    Follow us on

    Facebook Twitter Google+

    https://www.facebook.com/pages/ApexTgi-Pvt-Ltd/353478941333744https://twitter.com/ApextgiNoidahttps://plus.google.com/b/116818519717421915276/+ApexTGIndiaPvtLtdNoida/posts

    Slide 1VPNWhy is it a Virtual Private Network?Tunnel and ConnectionsVPN Major CharacteristicsSlide 7Application AreasSome Common Uses of VPNRemote Access Over the InternetConnecting Two Computer Networks SecurelySecuring a Part of the Corporate NetworkBasic VPN RequirementsUser AuthenticationAddress ManagementData EncryptionKey ManagementMulti-protocol SupportSlide 19