0% found this document useful (0 votes)
110 views

Virtual Private Network: Synopsis On

IDS Infotech provides virtual private network (VPN) services to allow secure remote access and connection between networks. VPN uses encryption and tunneling to protect confidential data as it travels over the public Internet. IDS conducts security audits and provides technical support services to help clients identify vulnerabilities and resolve network and software issues. The objective of this VPN study is to address the business need for remote work and distributed operations by allowing secure access and communication between remote workers and central resources over the Internet.

Uploaded by

harjassingh27
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views

Virtual Private Network: Synopsis On

IDS Infotech provides virtual private network (VPN) services to allow secure remote access and connection between networks. VPN uses encryption and tunneling to protect confidential data as it travels over the public Internet. IDS conducts security audits and provides technical support services to help clients identify vulnerabilities and resolve network and software issues. The objective of this VPN study is to address the business need for remote work and distributed operations by allowing secure access and communication between remote workers and central resources over the Internet.

Uploaded by

harjassingh27
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SYNOPSIS ON

VIRTUAL PRIVATE NETWORK


Undertaking at IDS Infotech, Mohali

Lovely Institute Of Technology


Jalandhar

Submitted By:- Submitted To:-


Harjas Singh Khurana Mr. Anshul Mahajan
B.Tech/ ECE Training and Placement
7080405587 Officer
INTRODUCTION
IDS Infotech Limited uses a seamless global delivery network and extensive domain
expertise to help any type of business achieve rapid and sustainable cost savings, improve
cash flow and drive top-line growth.
We’ve been helping businesses achieve organizational flexibility since 1989. From the US to
Europe to the foothills of the Indian Himalayas, the IDS family has over 1200 global
employees. IDS applies the latest technological advances, a highly educated workforce and
our total customer commitment to provide cost-effective solutions to our clients around the
world.
IDS Infotech has the capabilities to support and grow large volume, complex, transaction-
driven companies. Our state-of-the-art industry solutions—from targeted service
improvements to mitigating process, security and regulatory demands of large corporations—
consistently deliver unmatched value and quality for our clients.
IDS Infotech is part of the Winsome Group (www.winsomegroup.com) of companies in
India. Over the past 50 years, a number of independent companies with a reputation for
dynamic growth, product quality, managerial excellence and business integrity have come
together to form the Winsome Group. The activities of the group now span areas as diverse as
trading, textiles, yarns, knitted fabric, brewing, tea plantations, sugar, chemicals, information
technology, engineering and agro-industrial products.

Services provided by IDS Infotech :–


 Legal Services
 Engineering Services
 IT Services
 Publishing Services
 Healthcare Services

IT Services-
IDS Infotech Limited, established in 1989 has emerged as a leading IT Solutions and Service
provider of this region, catering to the needs of the Global markets. The IDS service portfolio
includes end-to-end Software services in software development, QA & Testing using the
latest cutting edge technologies and methodologies.

It provides network security and technical support services.

Network Security And Technical Support Services:-

Security Audits:-

Most companies are confident about the physical security of their offices, but little is
known about the security of their computer network. It is important for companies to find
out where their network is vulnerable before it is compromised. Security audits can be
done on scheduled intervals that you can set depending on the value of your data and risk
tolerance.

The Process-

Real Time's technical staff will scan and probe your network remotely, searching for
vulnerabilities that could put network services at risk. A network engineer can also go
onsite to check for any internal security issues making sure there is protection from both
external and internal threats. The audit concludes with a written report indicating any
vulnerabilities discovered. The technical staff can also research corrective measures to
security issues, if needed.

The Investment-

Quotes for Security Audits are based on the size of the network and the number of
services running. The number of vulnerabilities also plays an important role... the more
security issues; the longer the audit will take. The final written report is designed to give
you enough information so you will have a choice of using Real Time, internal personnel
or other outside consultants to work on any problems.

Technical Support generally refers to the services which provide assistance for the
technology products. They also help the user in solving certain specific problems. Our
Company provides technical support to our clients over the telephone, through e-mail or on
website. Our experienced technicians provide online support to our clients. Our technicians
are highly responsible and stick to their commitments. We provide best possible service in
the most efficient manner. Our trained Technical Engineers are available 24X7.
 
We are capable of handling the most difficult software issues and providing effective
solutions. Our experienced technical team will ensure that your computer or network problem
is resolved as quickly as possible. We are here to extend our outstanding customer support
services through self-help or by assisted-help resources. Our technicians analyze the
customer’s problem and sort it out through the best possible solution available. We have the
advanced technical troubleshooting and analysis methods.
 
Our technical team has been skilled for handling the most difficult or advanced problems too.
We are certified to ensure high level of Information Technology Service and Support
Standards. It’s a proven fact that our support services results in reduce infrastructure
management costs, improve system, network stability, efficiency of staff and increment in
productivity.
 
We always ensure that are customers get best quality solutions on –time and also at a
reasonable cost. Our technical support technicians can assist you when ever needed or can
provide guidance remotely. We are here to provide best IT services.
Under Network Security, i am doing Virtual Private Network which is decribed as follows.

VPN (Virtual Private Network):-

VPN or Virtual Private Network describes a network that includes secure remote access
for client computers. It can be explained best by looking at its parts. Virtual describes the
fact that the network doesn't need to be physically connected. The Private confirms that
the data is encrypted and can only be viewed by a defined group. The last word,
Network, means that the users configured for VPN can be connected and share files or
information.

For instance, field representatives for a company can work on the "home offices"
network over the Internet. This access will have the same look and feel as if they are
back at the office physically connected to their network, except the reps are working at
the speed of their local modem. The data is sent to and from the reps (or to and from the
network) encrypted, so it's extremely difficult for anyone to snoop on confidential
information.

Figure 1: Virtual private network connection

IPSEC

IPSEC is one of the best VPN solutions. It connects networks via the Internet using
encrypted traffic, so an office in San Francisco can share different files and data with an
office in Boston in a secure fashion. IPSEC also allows Windows 2000 or Windows XP
client machines, which support IPSEC by default, to connect to Real Time's Linux
Firewall.

PPTP

Another option for VPN is PPTP or Point to Point Tunneling Protocol. PPTP works best
connecting Real Time's Firewall Solution with remote client machines running Windows
95/98/ME via encrypted network traffic.
OBJECTIVE OF STUDY

VPN technology is designed to address issues surrounding the current business trend toward
increased telecommuting and widely distributed global operations, where workers must be
able to connect to central resources and must be able to communicate with each other.

Problem Identification and Problem Formulation

Remote Access Over the Internet 


VPNs provide remote access to corporate resources over the public Internet, while
maintaining privacy of information.

Connecting Networks Over the Internet 


There are two methods for using VPNs to connect local area networks at remote sites:
 Using dedicated lines to connect a branch office to a corporate LAN. Rather than
using an expensive long-haul dedicated circuit between the branch office and the
corporate hub, both the branch office and the corporate hub routers can use a local
dedicated circuit and local ISP to connect to the Internet. The VPN software uses the
local ISP connections and the Internet to create a virtual private network between the
branch office router and corporate hub router.
 Using a dial-up line to connect a branch office to a corporate LAN. Rather than
having a router at the branch office make a long distance (or 1-800) call to a corporate
or outsourced NAS, the router at the branch office can call the local ISP. The VPN
software uses the connection to the local ISP to create a VPN between the branch
office router and the corporate hub router across the Internet.
Connecting Computers over an Intranet 
In some corporate internetworks, the departmental data is so sensitive that the department's
LAN is physically disconnected from the rest of the corporate internetwork. Although this
protects the department's confidential information, it creates information accessibility
problems for those users not physically connected to the separate LAN.

Scope of Study
A VPN reduces the number of modems and telephone lines required centrally to support dial-
in networking and dramatically decreases long distance charges since remote PC users would
connect to their local ISP instead of dialing direct to head office.

VPNs use encryption and tunneling to protect confidential information as it travels over the
Internet.

Data Collection
A VPN is a communications environment in which access is controlled to permit peer
connections only within a defined community of interest, and is constructed through some
form of partitioning of a common underlying communications medium, where this
underlying communications medium provides services to the network on a non-exclusive
basis.

 A VPN is a private network constructed within a public network infrastructure, such as the
global Internet.

 A Virtual Private Network is a connectivity object between two or more private entities. It
uses the Internet or public domain infrastructure and connects private networks.

Research Tools Applied


To properly administer a VPN system, network administrators should be able to track who
uses the system, how many connections are made, unusual activity, error conditions, and
situations that may indicate equipment failure. This information can be used for billing,
auditing, and alarm or error-notification purposes.

For example, an administrator may need to know who connected to the system and for how
long in order to construct billing data. Unusual activity may indicate a misuse of the system
or inadequate system resources. Real-time monitoring of equipment (for example, unusually
high activity on one modem and inactivity on another) may generate alerts to notify the
administrator of a modem failure. The tunnel server should provide all of this information,
and the system should provide event logs, reports, and a data storage facility to handle the
data appropriately.

References and Bibliography


 Framework for IP Based Virtual Private Networks
 www.real-time.com
 www.netz.com
 VPNs: A Beginner's Guide
 IPSec: Securing VPNs

You might also like