SlideShare a Scribd company logo
1 of 3
Netmetric Solutions
                       ( Meer Shahanawaz ) ( Abdullah )




                              VPN Definition
Virtual Private Network. A network which uses the public network to transfer
information using secure methods. For example, you could set up a VPN between
your home office and your business office using security and encryption and the
Internet as your transfer pipe.

VPN is used to make the communication between two private networks over the
Internet.




A VPN carris private traffic over a public network using advanced encryption and
tunnels to protect:
       .Confentiality of Information
              .integrity of data
                      .Authentication of users

 A VPN is used to make the tunnel between two private netwoks over the
internet.
            . A tunnel is a virtual point-point connection.
                   . The tunnel carries one protocol inside another protocol
                            . Encryption transforms content information into
ciphertext                         . Decryption restores content information from
ciphertext

Types of VPN
     1.Site to Site VPN                2.Remote Access VPN

VPN with different Host
       1.PC ( Host ) to PC (Host )      2.PC (Host) to       Router
                         3.Router to     Router                 4.Router   to
Firewall                       5.Firewall to    Firewall




1.VPN used the protocols to make the tunnel , such as
             PPTP    Point to Point Protocol
                   L2TP     Layer 2 Tunneling Protocol
                          IPSEC Internet Protocol Security




2.VPN   used to make the Gateway to Gateway to communication
3.VPN is used to encrypt the using some public or private key , so that only
authorized users is able to decrypt the communication.




                                       PPTP        Definition

                Point-to-Point Tunneling Protocol, a new technology for creating
Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S.
Robotics, and several remote access vendor companies, known collectively as the
PPTP Forum. A VPN is a private network of computers that uses the public Internet to
connect some nodes. Because the Internet is essentially an open network, the Point-
to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from
one VPN node to another are secure. With PPTP, users can dial in to their corporate
network via the Internet.

                                        L2TP       Definition



Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate
Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP
from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the
protocol.




                                           IP SECURITY


Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the
IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs).
IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion
(payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the
header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.

For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through
a protocol known as Internet Security Association and Key Management Protocol/Oakley
(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using
digital certificates

More Related Content

What's hot

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Mpls based vpn connectivity
Mpls based vpn connectivityMpls based vpn connectivity
Mpls based vpn connectivityPrem kumar
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkMariana Hansen
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
VPN presentation
VPN presentationVPN presentation
VPN presentationRiazehri
 
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPIoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPAnshu Pandey
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport)MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport)Eko Rudiawan
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesThe Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesFabio Gatti
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 

What's hot (20)

Vpn
VpnVpn
Vpn
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Mpls based vpn connectivity
Mpls based vpn connectivityMpls based vpn connectivity
Mpls based vpn connectivity
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Understanding of MQTT for IoT Projects
Understanding of MQTT for IoT ProjectsUnderstanding of MQTT for IoT Projects
Understanding of MQTT for IoT Projects
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTPIoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
IoT Communication Protocols, Socket Programming with Python, MQTT & HTTP
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport)MQTT (Message Queue Telemetry Transport)
MQTT (Message Queue Telemetry Transport)
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
VPN
VPNVPN
VPN
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesThe Role of the Communication Protocols in the IoT: Pitfalls and Advantages
The Role of the Communication Protocols in the IoT: Pitfalls and Advantages
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 

Viewers also liked

Updated registration packet2010
Updated registration packet2010Updated registration packet2010
Updated registration packet2010Sandy Chamber
 
הסוזן התוכנית לחטוף את בגין
הסוזן   התוכנית לחטוף את בגיןהסוזן   התוכנית לחטוף את בגין
הסוזן התוכנית לחטוף את בגיןhaimkarel
 
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศการแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศPrincess Chulabhorn's College, Chiang Rai Thailand
 
Retrospectiva primului an de participare la Programul BIBLIONET
Retrospectiva primului an de participare la Programul BIBLIONETRetrospectiva primului an de participare la Programul BIBLIONET
Retrospectiva primului an de participare la Programul BIBLIONETBakai Magdolna
 
Ujian koko 2013
Ujian koko 2013Ujian koko 2013
Ujian koko 2013SMK BAKAI
 
שיעור שתיים מעבד התמלילים
שיעור שתיים   מעבד התמליליםשיעור שתיים   מעבד התמלילים
שיעור שתיים מעבד התמליליםhaimkarel
 
Interacciones de quimioterapia y radioterapia
Interacciones de quimioterapia y radioterapiaInteracciones de quimioterapia y radioterapia
Interacciones de quimioterapia y radioterapiaGonzalo Pavez
 
Tdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-productsTdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-productsTDR d.o.o Rovinj
 
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu SrbijePrezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu SrbijeTDR d.o.o Rovinj
 
Estonia Power Point
Estonia Power PointEstonia Power Point
Estonia Power Pointguestfc17a1
 
Global Trends in Open Educational Resources
Global Trends in Open Educational ResourcesGlobal Trends in Open Educational Resources
Global Trends in Open Educational Resourcesnazzzy
 

Viewers also liked (20)

Updated registration packet2010
Updated registration packet2010Updated registration packet2010
Updated registration packet2010
 
written shot by shot
written shot by shotwritten shot by shot
written shot by shot
 
הסוזן התוכנית לחטוף את בגין
הסוזן   התוכנית לחטוף את בגיןהסוזן   התוכנית לחטוף את בגין
הסוזן התוכנית לחטוף את בגין
 
Replacing Rounds PSA Stonaker
Replacing Rounds PSA StonakerReplacing Rounds PSA Stonaker
Replacing Rounds PSA Stonaker
 
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศการแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
การแก้ปัญหาและร่วมมือทางเศรษฐกิจระดับชุมชนและประเทศ
 
Retrospectiva primului an de participare la Programul BIBLIONET
Retrospectiva primului an de participare la Programul BIBLIONETRetrospectiva primului an de participare la Programul BIBLIONET
Retrospectiva primului an de participare la Programul BIBLIONET
 
Ujian koko 2013
Ujian koko 2013Ujian koko 2013
Ujian koko 2013
 
2merchan
2merchan2merchan
2merchan
 
1
11
1
 
Psdeg
PsdegPsdeg
Psdeg
 
Laudo
LaudoLaudo
Laudo
 
שיעור שתיים מעבד התמלילים
שיעור שתיים   מעבד התמליליםשיעור שתיים   מעבד התמלילים
שיעור שתיים מעבד התמלילים
 
Interacciones de quimioterapia y radioterapia
Interacciones de quimioterapia y radioterapiaInteracciones de quimioterapia y radioterapia
Interacciones de quimioterapia y radioterapia
 
Exchange server
Exchange   serverExchange   server
Exchange server
 
Tdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-productsTdr prezentacija rezultata bi h 03.06.2104-no-products
Tdr prezentacija rezultata bi h 03.06.2104-no-products
 
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu SrbijePrezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
Prezentacija rezultata TDR poslovanja u 2013. godini na tržištu Srbije
 
เมียนม่าร์
เมียนม่าร์เมียนม่าร์
เมียนม่าร์
 
Estonia Power Point
Estonia Power PointEstonia Power Point
Estonia Power Point
 
Global Trends in Open Educational Resources
Global Trends in Open Educational ResourcesGlobal Trends in Open Educational Resources
Global Trends in Open Educational Resources
 
Vietnam paisatges
Vietnam paisatgesVietnam paisatges
Vietnam paisatges
 

Similar to VPN Definition Explained in Detail

Similar to VPN Definition Explained in Detail (20)

Vpn
VpnVpn
Vpn
 
V P N
V P NV P N
V P N
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
F0322038042
F0322038042F0322038042
F0322038042
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private Network
 
Vpn protocols
Vpn protocolsVpn protocols
Vpn protocols
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Ip sec
Ip secIp sec
Ip sec
 
Vpn_NJ ppt
Vpn_NJ pptVpn_NJ ppt
Vpn_NJ ppt
 
Vpn security
Vpn security Vpn security
Vpn security
 

More from proser tech

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..proser tech
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp servicesproser tech
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trustproser tech
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp servicesproser tech
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do iproser tech
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command lineproser tech
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32proser tech
 
Excell shortcuts
Excell shortcutsExcell shortcuts
Excell shortcutsproser tech
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Cardproser tech
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPtproser tech
 

More from proser tech (18)

New search engine Alternative for Google..
New search engine Alternative for Google..New search engine Alternative for Google..
New search engine Alternative for Google..
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Outlook Express
Outlook ExpressOutlook Express
Outlook Express
 
Double routing
Double  routingDouble  routing
Double routing
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Active directory domain and trust
Active  directory  domain  and  trustActive  directory  domain  and  trust
Active directory domain and trust
 
Windows xp services
Windows xp servicesWindows xp services
Windows xp services
 
Windows profile
Windows profileWindows profile
Windows profile
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do i
 
Network printer
Network printerNetwork printer
Network printer
 
A z index of the windows cmd command line
A z index of the windows cmd command lineA z index of the windows cmd command line
A z index of the windows cmd command line
 
Difference between ntfs and fat32
Difference between ntfs and fat32Difference between ntfs and fat32
Difference between ntfs and fat32
 
Excell shortcuts
Excell shortcutsExcell shortcuts
Excell shortcuts
 
Windows xp tips
Windows xp tipsWindows xp tips
Windows xp tips
 
Xlshortcuts07
Xlshortcuts07Xlshortcuts07
Xlshortcuts07
 
Pavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation CardPavan Gadey Marriage Invitation Card
Pavan Gadey Marriage Invitation Card
 
SpN corporate PPt
SpN corporate PPtSpN corporate PPt
SpN corporate PPt
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

VPN Definition Explained in Detail

  • 1. Netmetric Solutions ( Meer Shahanawaz ) ( Abdullah ) VPN Definition Virtual Private Network. A network which uses the public network to transfer information using secure methods. For example, you could set up a VPN between your home office and your business office using security and encryption and the Internet as your transfer pipe. VPN is used to make the communication between two private networks over the Internet. A VPN carris private traffic over a public network using advanced encryption and tunnels to protect: .Confentiality of Information .integrity of data .Authentication of users A VPN is used to make the tunnel between two private netwoks over the internet. . A tunnel is a virtual point-point connection. . The tunnel carries one protocol inside another protocol . Encryption transforms content information into ciphertext . Decryption restores content information from ciphertext Types of VPN 1.Site to Site VPN 2.Remote Access VPN VPN with different Host 1.PC ( Host ) to PC (Host ) 2.PC (Host) to Router 3.Router to Router 4.Router to Firewall 5.Firewall to Firewall 1.VPN used the protocols to make the tunnel , such as PPTP Point to Point Protocol L2TP Layer 2 Tunneling Protocol IPSEC Internet Protocol Security 2.VPN used to make the Gateway to Gateway to communication
  • 2. 3.VPN is used to encrypt the using some public or private key , so that only authorized users is able to decrypt the communication. PPTP Definition Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. A VPN is a private network of computers that uses the public Internet to connect some nodes. Because the Internet is essentially an open network, the Point- to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. L2TP Definition Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems. Like PPTP, L2TP requires that the ISP's routers support the protocol. IP SECURITY Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs).
  • 3. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates