vpn presnt
TRANSCRIPT
![Page 1: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/1.jpg)
1
2015-2016
Introduction of VPN solutionBy Nour frikha & Becem Adid
![Page 2: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/2.jpg)
2
distance
Home
Office
Nour frikha & Becem Adid
![Page 3: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/3.jpg)
V P N
IRTUALRIVATEETWORK
![Page 4: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/4.jpg)
Nour frikha & Becem Adid 4
What’s VPN
Technology that creates a direct link between remote computers in private network over a public one.
carrier protocol encapsulation protocol passenger protocol
![Page 5: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/5.jpg)
Nour frikha & Becem Adid
Logical solution for remote access. Secure communications. Trylored to individuals. Enhancing productivity. Increase flexibility (anytime and anywhere
give employers to access). Reduce costs of communications.Thanks to VPN technology employers can
take their office and make flexible work schedule.
What’s VPN
5
![Page 6: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/6.jpg)
Nour frikha & Becem Adid 6
VPN functionSecurity
connect in same private
network access to the information in secure way (remote computers) from any plce in the word
![Page 7: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/7.jpg)
7
VPN allows:
online banking
Hot spots Online shopping
Secure communicationData
Security
Media files
Nour frikha & Becem Adid
![Page 8: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/8.jpg)
Nour frikha & Becem Adid 8
• Private traffic and safe from hacker and sniffer and other danger in internet (virus or pirates).
• Crypted and secure communication become anonymous online.
![Page 9: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/9.jpg)
Nour frikha & Becem Adid 9
VPN
Because of geolocation block connect ( video , news , search ) non available data
![Page 10: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/10.jpg)
Nour frikha & Becem Adid 10
online contact for government censorship : let the information be available for users and give the key to more freedom
![Page 11: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/11.jpg)
Nour frikha & Becem Adid 11
VPN uses :
PPTPPPTP (Point-to-Point Tunneling Protocol) tunnel protocol point-to-point is a PPP encapsulation over IP developed by Microsoft.
L2TPLayer 2 Tunnelling Protocol is a tunnelling protocol used to support virtual private networks (VPNs) It does not provide any encryption or confidentiality by itself.
IPSECInternet Protocol Security (IPsec) allows two or more hosts to communicate in a secure manner by authenticating and encrypting each IP packet of a communication session
SSL(TLS)Secure Sockets Layer (SSL) VPN is an emerging technology that provides remote-access VPN capability and allows users from any Internet-enabled location to launch a web browser to establish remote-access VPN connections
VPNto provide security of data transfer from danger of internet
![Page 12: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/12.jpg)
Nour frikha & Becem Adid 12
Demo
![Page 13: Vpn presnt](https://reader030.vdocuments.us/reader030/viewer/2022020921/587688ba1a28ab1b158b7a9d/html5/thumbnails/13.jpg)
Nour frikha & Becem Adid 13
Thank you for attention