virtual private network(vpn) presented by aparna chilukuri
TRANSCRIPT
![Page 1: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/1.jpg)
Virtual Private Network(VPN)
Presented By
Aparna Chilukuri
![Page 2: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/2.jpg)
What is a VPN?
• A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.
![Page 3: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/3.jpg)
What Makes a VPN?
• Remote Access• Site-to-Site
• Intranet• Extranet
• Secure VPN• Trusted VPN• Hybrid VPN• Provider-Provisioned VPN
![Page 4: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/4.jpg)
VPN Security
authentication—ensuring that the data originates at the source that it claims
access control—restricting unauthorized users from gaining admission to the network
confidentiality—preventing anyone from reading or copying data as it travels across the Internet
data integrity—ensuring that no one tampers with data as it travels across the Internet
![Page 5: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/5.jpg)
What is Tunneling ?
• Tunneling is the process of placing an entire packet within another packet and sending it over a network.
• Tunneling requires three different protocols: Carrier protocol Encapsulating protocol - GRE, IPSec, L2F, PPTP,
L2TP Passenger protocol - IPX, NetBeui, IP
![Page 6: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/6.jpg)
VPN Protocols
• Remote Access• PPTP(Point -to -Point Tunneling Protocol)
• L2F(Layer 2 forwarding)
• L2TP( Layer 2 tunneling Protocol)
• Lan-to-Lan • IPSec
![Page 7: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/7.jpg)
IPSec Uses
Diffie-Hellman key exchanges to deliver secret keys between peers on a public net
public-key cryptography for signing Diffie-Hellman exchanges, to guarantee the identities of the two parties and avoid man-in-the-middle attacks
data encryption standard (DES) and other bulk encryption algorithms for encrypting data
keyed hash algorithms (HMAC, MD5, SHA) for authenticating packets
• digital certificates for validating public keys
![Page 8: Virtual Private Network(VPN) Presented By Aparna Chilukuri](https://reader036.vdocuments.site/reader036/viewer/2022072006/56649f425503460f94c61c0a/html5/thumbnails/8.jpg)
Conclusion
• Loopholes– Hackers will try to "piggyback" onto an
existing VPN connection that a remote worker has established, either inserting viruses into a system or removing and viewing sensitive files