VPN Series part 1 :- Introduction of VPN
Dinesh Kumar
Junior Telecom Officer @ Bharat Sanchar Nigam Limited | BCA | CCNA | CCNP R&S | CCNP SECURITY | GERMAN LANGUAGE B2 | MBA in Operations Management
Introduction of VPN
·??????? VPN stands for Virtual Private Network.
·??????? VPN provide data integrity, authentication and data encryption to ensure confidentiality of the packets sent over an unprotected network or the Internet.
·??????? VPN used to replace the high cost of lease line, which? is a dedicated line between to sites provided by the Internet Service Provider (ISP). Its speed is also slower than Internet.
·??????? Many different protocols have been used for VPN implementation as following:-
1.????? Point-to-Point Tunnelling Protocol (PPTP)
2.????? Layer 2 Forwarding Protocol (L2f)
3.????? Layer 2 Tunnelling? Protocol (L2TP)
4.????? Generic Routing Encapsulation (GRE) Protocol
5.????? Internet Protocol Security (IPsec)
6.????? Secure Socket Layer (SSL)
7.????? Multiprotocol Label Switching (MPLS) VPN
·??????? VPN categorized into two distinct groups
1.????? Site-to-site VPNs
2.????? Remote access VPNs
·??????? Site-to-site VPNs:- uses a VPN tunnel between two sites of an organization for communication.
1.????? ?Static crypto maps
2.????? Dynamic crypto maps
3.????? IPsec
4.????? GRE with IPsec
5.????? DMVPN (Dynamic multipoint VPN)
6.????? GET VPN ( Group Encrypted Transport VPN)
7.????? Flex VPN
Figure:- Site-to-site VPN
? Remote-access VPNs :- it enables user to work from any remote location e.g home, hotels etc.
1.????? SSL (Secure Socket Layer )
Figure :- Remote-access VPN