VPNs

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

GROUP D

Seminar
On
Virtual Private Networks
(VPN)
Content
What is VPN
Types of VPN’s
How does it work?
Protocols
Security: Firewalls
VPN Devices
Advantages
Disadvantages
Features
Future
Conclusion
What is VPN
 Virtual private networks are security
technologies that provide your device and
the internet a private and secure connection.
Your internet traffic is encrypted and
directed through a distant server run by the
VPN provider when you connect to one.
Through this procedure, you may get
around limitations or censorship while also
improving security and protecting your
online privacy.

 Became popular as more employees worked


in remote locations.

 Terminologies to understand how VPNs


work.
Types of VPN’s
Remote-Access VPN

Site-to-Site VPN (Intranet-based)

Site-to-Site VPN (Extranet-based)


Remote-Access VPN
 A remote access VPN is for home or travelling
users who need to access their central LAN from a
remote location.
They dial their ISP and connect over the internet
to the LAN.
This is made possible by installing a client
software program on the remote user’s laptop or
PC that deals with the encryption and decryption
of the VPN traffic between itself and the VPN
gateway on the central LAN.
Site-to-Site VPN
Intranet-based - If a company has one or more
remote locations that they wish to join in a single
private network, they can create an intranet VPN
to connect LAN to LAN.
Extranet-based - When a company has a close
relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that
allows all of the various companies to work in a
shared environment.
All 3 types of VPN
Protocols used in VPN
PPTP - Point-to-point tunneling protocol
L2Tp – Layers to Tunneling Protocol
IPSec - Internet protocol security
SSTP – Security socket tunneling protocol
protocol used in VPN
 By establishing a virtual private network (VPN) across TCP/IP-based data
networks, the Point-to-Point Tunneling Protocol (PPTP) is a network protocol
that permits the safe transport of data from a remote client to a private company
server.
 Layer 2 Tunneling Protocol/IPsec (L2TP/IPsec): L2TP is a tunneling protocol that
allows for the creation of virtual private networks. Since it cannot offer
encryption on its own, IPsec is frequently added for secure communication. Many
devices and operating systems support L2TP/IPsec.
 IPsec (Internet Protocol Security) is a commonly used protocol suite that offers
safe authentication and IP packet encryption. It may work in two different
modes: tunnel mode and transport mode. In tunnel mode, the whole IP packet is
enclosed inside another IP packet for secure transmission. For key management,
IPsec is frequently used with other protocols like IKE (Internet Key Exchange).
 Microsoft created the Secure Socket Tunneling Protocol (SSTP), a VPN protocol.
It employs TCP port 443 and SSL/TLS encryption, making it challenging to stop
or identify. Windows operating systems are the main platform for SSTP usage.
VPN Security: Firewall
A well-designed VPN uses several methods for keeping
your connection and data secure:
Firewalls
Encryption
IPSec
AAA Server

You can set firewalls to restrict the number of open


ports, what type of packets are passed through and
which protocols are allowed through.
VPN Devices
 Hardware
Routers with built-in VPN capabilities are known as VPN routers. They allow you to
tunnel all internet traffic through the VPN and connect many devices to the VPN
network at once. In households, small workplaces, or as a specialized VPN gateway for
larger networks, VPN routers are often used.

VPN concentrators are used in corporate settings to manage a high volume of VPN
connections. In order to provide a safe connection between remote clients and the
central network, they offer high-performance encryption and decryption of VPN traffic.

 Firewall
Check Point is a reputable supplier of network security solutions, including Check Point
Security Gateways. Their Security Gateways include comprehensive security capabilities
including URL filtering, firewall protection, VPN connection, and intrusion prevention.

A family of high-performance firewalls called Juniper Networks SRX Series offers


enhanced threat protection, VPN connectivity, intrusion detection, and prevention, as
well as application visibility and management.
Cont
 Software
Check Point Virtual Systems: Check Point Virtual Systems is a
virtual machine-deployable software-based firewall system. It offers
threat protection, VPN, firewalling, and other security features. On
a single physical server, many virtual systems may be installed,
providing scalability and consolidation.

Virtual Appliance for Sophos XG Firewall: A virtual appliance


powered by software is available for Sophos XG Firewall. In addition
to other security capabilities, it offers firewalling, VPN connection,
browser filtering, and antivirus. The virtual appliance may be set up
in a number of cloud settings or virtualization platforms.
VPN Advantages

Multiple telephone lines and banks of modems at the


central site are not required.
 A reduction in the overall telecommunication
infrastructure – as the ISP provides the bulk of the
network.
 Reduced cost of management, maintenance of
equipment and technical support.
 Simplifies network topology by eliminating modem
pools and a private network infrastructure.
 VPN functionality is already present in some IT
equipment.
VPN Disadvantage
If the ISP or Internet connection is down, so is the
VPN.
 The central site must have a permanent internet
connection so that remote clients and other sites can
connect at anytime.
VPNs may provide each user with less bandwidth than
a dedicated line solution.
 Existing firewalls, proxies, routers and hubs may not
support VPN transmissions.
VPN Features
Security – tunneling support between sites with at
least 128bit encryption of the data.
Scalability – extra users and bandwidth can be added
easily to adapt to new requirements.
Services – quality of service features, including
bandwidth, management and traffic shaping, are
important to avoid congestion.
 Management – reports on user activity, management
of user policies and monitoring of the VPN as a whole.
Future of VPN
VPN popularity
 Companies choosing VPN
 Cost efficient?
 New way of communicating?
Future of VPN: Companies with VPN
 A number of important trends and advancements are
expected to influence how VPNs grow in the future. Despite
the fact that I can offer some insights based on the present
environment, it's crucial to keep in mind that technology is a
dynamic industry that is always evolving. Here are a few
variables that could affect how VPNs develop in the future:
 Demand for privacy and security is likely to increase as online
dangers continue to change and privacy issues become more
prevalent. Users are likely to look for more advanced security
measures, greater encryption, and better privacy protection.
 Enhancing the User Experience: VPN providers may
prioritize improving the user experience by providing
intuitive user interfaces, seamless platform and device
integration, and streamlined setup procedures. This may
increase the use and attraction of VPNs among more types of
consumers.
 5G Networks and Mobile VPNs: Mobile VPNs may become
more common as 5G networks are used more widely and
mobile devices are used more often. Mobile VPNs enable
smooth switching between cellular and Wi-Fi networks while
offering secure connectivity for consumers who are always on
the move.
Conclusion
As we have gone through all possible details we
conclude that VPN is the best option for the corporate
networking.
As many companies need to have access to Internet
and hence security is also the main concern.
 VPN provides best possible combination of security
and private network capabilities with adequate cost –
saving to the companies who are presently working
with leased lines.
References
 www.comparitech.com
www.findbestresults.com
Questions
 Which of the following best describes a VPN?
a) A software for managing virtual pets b) A secure network connection over the
internet c) A type of social media platform d) A gaming console accessory
Answer: b) A secure network connection over the internet
 What is the primary purpose of using a VPN?
a) Accessing social media platforms b) Enhancing gaming performance c)
Encrypting internet traffic and ensuring privacy d) Improving download speeds
Answer: c) Encrypting internet traffic and ensuring privacy
 Which layer of the OSI model do VPNs primarily operate on?
a) Physical layer b) Data link layer c) Network layer d) Application layer
Answer: c) Network layer
 Which protocol is commonly used for establishing VPN connections?
a) HTTP b) TCP c) IPsec d) DNS
Answer: c) IPsec
 True or False: VPNs can bypass geographic restrictions and access region-locked
content.
Questions
 Which type of VPN allows users to connect to a private network from anywhere on the
internet? a) Remote-access VPN b) Site-to-site VPN c) Layer 2 Tunneling Protocol (L2TP) d)
Point-to-Point Tunneling Protocol (PPTP)
Answer: a) Remote-access VPN
 Which security mechanism is used by VPNs to encrypt data transmitted over the internet? a)
SSL/TLS b) POP3 c) SMTP d) HTTP
Answer: a) SSL/TLS
 What is the purpose of a VPN tunnel? a) To increase internet connection speed b) To provide a
secure pathway for data transmission c) To block malicious websites d) To reduce latency in
online gaming
Answer: b) To provide a secure pathway for data transmission
 Which of the following devices is commonly used as a VPN endpoint? a) Firewall b) Router c)
Switch d) Modem
Answer: a) Firewall
 Which of the following is NOT a benefit of using a VPN? a) Enhanced security and privacy b)
Access to restricted content c) Increased internet speed d) Protection against hackers on public
Wi-Fi networks
Answer: c) Increased internet speed
THANK YOU

You might also like