Virtual Private Network: Implementation, Security, and Threats

Verified

Added on  2024/04/26

|11
|617
|156
Presentation
AI Summary
This presentation provides an overview of Virtual Private Networks (VPNs), emphasizing their role in establishing secure connections for users, particularly within local area networks. It details the IP infrastructure requirements, including LAN connections, BYOD policies, and the use of servers like mail, web, and DNS. A network diagram illustrates a setup with four routers connected via tunneling over an ISP internet, ensuring secure data packet transmission between the main branch and headquarters. Security mechanisms such as IPSec and SSL are discussed to safeguard user information from network vulnerabilities, alongside potential threats like denial of service and intrusion. The presentation also covers encryption techniques like AES and MD5 used to maintain data security. It concludes by highlighting the successful implementation of VPN for Avita’s corporate network and referencing key sources for further information, available on Desklib.
Document Page
Virtual Private Network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
IP Infrastructure Requirements
Network Diagram
Security Mechanism
Threats to VPN
Encryption Techniques used
Conclusion
References
Table of Content
Document Page
Virtual private network provides secure
connection to the users
There are different types of VPN that are
connected with a local area network
These networks secure the network services
that are accessed online
Internet services are provided to users by
using Internet Service Provider (ISP)
Introduction
Document Page
Local area network connection
BYOD policy is needed for the employees
Servers like mail server, web server, DNS
server have to be used
Security mechanisms should be used to
protect the VPN
Network resources of headquarters should
be accessed by branch office employees
also
IP Infrastructure
requirements
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network Diagram
Document Page
Four routers which are connected via
tunnelling over ISP internet are located on
the different places.
Routers connected are of series 3725.
Main branch and Headquarters are able to
access the data packet which are
transmitted through the network.
Home users and mobile users are not able
to access the data packet from others which
are transmitted on this network.
Network Diagram
Document Page
These are used to ensure that the
information of users will be protected.
These safeguard information from security
vulnerabilities of a network
IPSec and SSL security mechanisms are
used for the company
It will determine security standard for the
network users.
This provide better accessibility to the
network users
Security Mechanisms
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VPN is responsible to provide better internet
connectivity and flexibility to all users which
are far distant form each other.
Various threats which can be generated
through VPN are:
1. Denial of Services
2. Intrusion
Threats to Virtual Private
Network
Document Page
Various encryption techniques are used in
this network to maintain the security
feature in transmitting the confidential data
through this network.
Encryption techniques used are
1. AES(Advanced Encryption Standard)
2. MD5(Message Digest Hashing)
Encryption Techniques used
Document Page
This presentation had successfully
discussed all the implementation of security
protocols.
In this network VPN is successfully
implemented for Avita’s Corporate network.
Security policy like IP sec and SSL security
are discussed.
Various encryption techniques which have
been used in this network are briefly
discussed in this report.
Conclusion
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[1] Microsoft, "Network Security Components", Microsoft, 2017. [Online].
Available:
https://msdn.microsoft.com/en-us/library/ms913708(v=winembedded.5).aspx.
[Accessed: 01- Feb- 2018].
[2] Ward, "SSL Certificate – Advantages and Disadvantages", Slideshare, 2014.
[Online]. Available: https://www.slideshare.net/JohnWard23/ssl-certificate-
advantages-and-disadvantages. [Accessed: 01- Feb- 2018].
[3]M. Pinola, "What Exactly is a VPN & Why Use One?", Lifewire, 2017. [Online].
Available: https://www.lifewire.com/what-is-a-vpn-2377977. [Accessed: 01-
Feb- 2018].
[4]D. Crawford, "VPNs for Beginners What You Need to Know
- BestVPN.com", BestVPN.com, 2016. [Online]. Available:
https://www.bestvpn.com/vpns-beginners-need-know/. [Accessed: 01- Feb-
2018].
[5]M. Rouse, "What is virtual private network (VPN)? - Definition from
WhatIs.com", SearchNetworking, 2017. [Online]. Available:
http://searchnetworking.techtarget.com/definition/virtual-private-network.
[Accessed: 01- Feb- 2018].
References
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]