what is virtual private network - vpn
DESCRIPTION
A virtual private network that is established over, in general, the InternetIt is virtual because it exists as a virtual entity within a public networkIt is private because it is confined to a set of private usersTRANSCRIPT
-
What is Virtual Private Network Introduction to VPN
ByApex TG India Pvt Ltdhttp://www.apextgi.in
http://www.apextgi.in/
-
VPN
A virtual private network that is established over, in general, the Internet
It is virtual because it exists as a virtual entity within a public network
It is private because it is confined to a set of private users
-
Why is it a Virtual Private Network?
From the users perspective, it appears as a network consisting of dedicated network links
These links appear as if they are reserved for the VPN clientele
Because of encryption, the network appears to be private
-
Tunnel and Connections
Tunnel The portion of the network where the data
is encapsulated Connection
The portion of the network where the data is encrypted
-
VPN Major Characteristics
Must emulate a point-to-point link Done by encapsulating the data that would
facilitate allow it to travel the Internet to reach the end point
Must emulate a private link Done by encrypting the data in the data
packets
-
Typical VPN Connection
-
Tunnel and Connections
Tunnel The portion of the network where the data
is encapsulated Connection
The portion of the network where the data is encrypted
-
Application Areas
In general, provide users with connection to the corporate network regardless of their location
The alternative of using truly dedicated lines for a private network are expensive propositions
-
Some Common Uses of VPN
Provide users with secured remote access over the Internet to corporate resources
Connect two computer networks securely over the Internet Example: Connect a branch office network to the
network in the head office Secure part of a corporate network for security
and confidentiality purpose
-
Remote Access Over the Internet
-
Connecting Two Computer Networks Securely
-
Securing a Part of the Corporate Network
-
Basic VPN Requirements
User Authentication Address Management Data Encryption Key Management Multi-protocol Support
-
User Authentication
VPN must be able to verify user authentication and allow only authorized users to access the network
-
Address Management
Assign addresses to clients and ensure that private addresses are kept private on the VPN
-
Data Encryption
Encrypt and decrypt the data to ensure that others on the not have access to the data
-
Key Management
Keys must be generated and refreshed for encryption at the server and the client
Note that keys are required for encryption
-
Multi-protocol Support
The VPN technology must support commons protocols on the Internet such as IP, IPX etc.
-
Thanks
Say Connected for more chapters on VPN
Follow us on
Facebook Twitter Google+
https://www.facebook.com/pages/ApexTgi-Pvt-Ltd/353478941333744https://twitter.com/ApextgiNoidahttps://plus.google.com/b/116818519717421915276/+ApexTGIndiaPvtLtdNoida/posts
Slide 1VPNWhy is it a Virtual Private Network?Tunnel and ConnectionsVPN Major CharacteristicsSlide 7Application AreasSome Common Uses of VPNRemote Access Over the InternetConnecting Two Computer Networks SecurelySecuring a Part of the Corporate NetworkBasic VPN RequirementsUser AuthenticationAddress ManagementData EncryptionKey ManagementMulti-protocol SupportSlide 19