1 / 11

Understanding VPN Concepts

Understanding VPN Concepts. Virtual Private Network (VPN) enables computers to Communicate securely over insecure channels Exchange private encrypted messages that others cannot decipher. What VPNs Are. VPN Virtual network connection Uses the Internet to establish a secure connection

jonco
Download Presentation

Understanding VPN Concepts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding VPN Concepts • Virtual Private Network (VPN) enables computers to • Communicate securely over insecure channels • Exchange private encrypted messages that others cannot decipher

  2. What VPNs Are • VPN • Virtual network connection • Uses the Internet to establish a secure connection • Secure tunnel • Extends an organization’s network • Endpoints • Specified computers, users, or network gateways

  3. Why Establish a VPN? • Business incentives driving VPN adoption • VPNs are cost-effective • VPNs provide secure connection for remote users • Contractors • Traveling employees • Partners and suppliers • VPN Components • VPN server or host • Configured to accept connections from clients • VPN client or guest • Endpoints connecting to a VPN

  4. Why Establish a VPN? (continued) • VPN Components • Tunnel • Connection through which data is sent • VPN protocols • Sets of standardized communication settings • Used to encrypt data sent along the VPN • Types of VPNs • Site-to-site VPN • Gateway-to-gateway VPN • Client-to-site VPN • Remote access VPN

  5. Why Establish a VPN? (continued) • Hardware versus software VPNs • Hardware-based VPNs • Connect one gateway to another • Routers at each network gateway encrypt and decrypt packets • VPN appliance • Designed to serve as VPN endpoint • Join multiple LANs • Benefits • Scalable • Better security

  6. Why Establish a VPN? (continued) • Hardware versus software VPNs (continued) • Software-based VPNs • Integrated with firewalls • Appropriate when participating networks use different routers and firewalls • Benefits • More cost-effective • Offer maximum flexibility

  7. Summary • VPNs do not make use of dedicated leased lines • VPNs send data through a secure tunnel that leads from one endpoint to another • VPNs keep critical business communications private and secure • VPN components • VPN servers • VPN clients • Protocols

  8. Summary (continued) • VPN types • Site-to-site • Client-to-site • Encapsulation encloses one packet within another • Conceals the original information • VPN protocols • Secure Shell (SSH) • Socks version 5 • Point-to-Point Tunneling Protocol (PPTP) • Layer 2 Tunneling Protocol (L2TP)

More Related