13-04-2013, 03:12 PM
Presentation On :VPN(virtual private network)
VPN.ppt (Size: 1.58 MB / Downloads: 38)
A VPNs must…..
VPNs must be encrypted,so no one can read it
VPNs must be authenticated
No one outside the VPN can alter the VPN
All parties to the VPN must agree on the security properties
What is needed?
Existing hardware (Servers, workstations,…)
Internet connection
VPN - Router/Switch
Software to create and manage tunnels
Security Device such as firewall
How it works?
Operates at layer 2 or 3 of OSI model
Layer 2 frame – Ethernet
Layer 3 packet – IP
Tunneling
Allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet
To ensure data security against unwanted viewers, or hackers.
Summary: VPNs
Very big in the work access space
Exploit High speed
Wireless
public ‘hot spots’ like Borders
Replaces direct dial into the work network
Replace dedicated Business partners
May replace the corporate WAN