• A typical VPN VPN Solutions
  • - Reduced cost of long distance access calls and internal equipment inventory
  • - Intranet VPNs provide full access to company’s network
  • - Communication provider is ‘t rusted ’ for data integrity and security.
  • - Encryption creates a security ‘tunnel’ that can’t be attacked
  • Virtual Private Network




    Download 98.27 Kb.
    bet1/3
    Sana01.04.2024
    Hajmi98.27 Kb.
    #184850
      1   2   3
    Bog'liq
    VirtualPrivateNetwork
    Mustaqil ta, 1668942904 (3), ИИКТ-Мустакил ишларни тайёрлаш учун қўлланма, ilhonjon===, Oksidlanish-qaytarilish reaksiyalari., water pollution, 1678980581, 1680672622, Jumanboyev Abdurahmon elektronika, 1681713047, ozbekistonning yangi tarixi, Sarvar Abduqodirov CV, 1699377232, 6-amaliy ish, Antenna va radioeshittirish MUSTAQIL ISH Avazbek [Avto saqlangan]

    Virtual Private Network

    prepared by

    Rachna Agrawal

    Lixia Hou

    Virtual Private Network (VPN)

    • VPNs are private data networks over public network – usually the Internet.
    • VPNs extend corporate networks to remote offices, mobile users, telecommuters and other extranet partners.
    • VPNs use advanced encryption and ‘tunneling’ technology to establish secure, end-to-end private network connections over Internet.

    A typical VPN

    VPN Solutions

    Remote access VPNs establish secure, encrypted connections between mobile or remote users and their corporate networks via a third-party network, such as a Internet Service Provider(ISP)

    - VPN client – software, hardware as well as router, or firewall based solutions available.

    - Reduced cost of long distance access calls and internal equipment inventory

    VPN Solutions

    Site-to-Site VPNs are an alternative WAN infrastructure that used to connect branch offices, home offices, or business partners' sites to all or portions of a company's network.

    - Intranet VPNs provide full access to company’s network

    - Extranet VPNS provide business partners with limited access to a company’s network

    VPN Technology

    • Trusted VPNs – companies lease circuits from communication providers and use them in the same manner they use physical cables in a private LAN
    • - Communication provider is ‘trusted’ for data integrity and security.

      - Used before Internet became universal

    VPN Technology

    • Secure VPNs use Internet as a corporate communication medium. Data is encrypted before sending, moved over to Internet, and then decrypted at the receiving end.
    • - Encryption creates a security ‘tunnel’ that can’t be attacked

      - More desirable than Trusted VPNs

    VPN Technology

    • Hybrid VPNs – A secure VPN is created as part of the trusted VPN thus creating a ‘hybrid’ VPN. Secure part of the VPN is usually administered by customer (using VPN equipments).
    • Secure VPNs that are administered by ISPs are called provider-provisioned VPNs.

    Download 98.27 Kb.
      1   2   3




    Download 98.27 Kb.