Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
3.1.4/3.1.5 Provision and use of VPNs
Transcript of 3.1.4/3.1.5 Provision and use of VPNs
Thank you for your attention!
VPNs are not always a force for good:
And one more thing...
"A virtual private network (VPN) is a secure network that uses primarily public telecommunication infrastructures, such as the Internet, to provide remote offices or traveling users an access to a central organizational network." http://en.wikipedia.org/wiki/VPN
Types of VPN
All traffic on the VPN must be encrypted and authenticated. Traffic is sent along virtual tunnels
All traffic on the VPN relies on the security of a providers network to protect the traffic.
A combination of both secure and trusted technologies.
Site to site VPN
Remote Access VPN
IPsec (IP security)
PPTP (point-to-point tunneling protocol)
L2TP (Layer 2 Tunnelling Protocol),
ViPNet VPN (IP VPN)
Frame relay circuits
A site to site VPN allows offices in different locations to connect securely over a public network such as the internet.
Each site is equipped with a VPN gateway such as a concentrator, router or firewall.
The VPN gateway is responsible for encapsulating and encrypting all outbound traffic and sending it through a VPN tunnel over the Internet to a peer VPN gateway at the target site. On receipt, the peer VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network.
In a Remote-access VPNs, clients, such as telecommuters, mobile users, and extranet consumers, are able to access a company network securely over the Internet. Each host typically has VPN client software loaded or uses a web-based client.
A remote-access VPN host or client typically has VPN client software. Whenever the host tries to send any information, the VPN client software encapsulates and encrypts the information before sending it over the Internet to the VPN gateway at the edge of the target network. On receipt, the VPN gateway handles the data in the same way as it would handle data from a site-to-site VPN.