Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

How Virtual Private Network (VPN) works?

user-image
Question ajoutée par Utilisateur supprimé
Date de publication: 2016/10/27
Umar Haroon Haroon Rasheed
par Umar Haroon Haroon Rasheed , DSL Installer , Esquare

Once the Internet connection is made, the user creates a VPN connection with the corporate VPN server. If the VPN connection is encrypted

Muhammad Irfan
par Muhammad Irfan , IT Engineer , Genx Systems

VPN works by encrypting your private communication over Public Internet allowing you to access your Private networks securely.

 

Muhammed Safwan
par Muhammed Safwan , Senior Network Consultant , Mannai Corporation

vpn is used to encrypt the data between network nodes for confidentiality. SSL and IPSEC are the widely used VPN protocols. When the vpn is build between geographical sites called Site-to-Site VPN.

When the vpn is bulld between an end host and site is called remote access vpn.

Mozair Anwar
par Mozair Anwar , Senior Consultant , Systems Limited

VPN is conceptualized as a tunnel between two points a source and a destination. This tunnel allows sharing of data between different LAN over a public network securely. 

Security in VPN is implemented using IPSec, SSL etc. these features encrypt your data and then send them through the tunnel.

Consider the following scenario you have two sites in two cities and your manager asks you to design a network on which the two sites are able to communicate as if they were in the same building but with much more security. First a VPN(GRE) tunnel is made between the two sites and then IPSec is implemented over the tunnel for security of data over the public network.

ahmed abdelmonem osman mohamed
par ahmed abdelmonem osman mohamed , network security engineer , EBS

well the VPN architecture use the ISAKMP (Internet security for key and management protocol) which is used for phase 1 this protocol provide the encryption, Hash, DH group authentication and lifetime. 

the basic idea is that exchange data over public networks such as the internet without any protection is very high risk to protect ur traffic over publick network the VPN is involved.

in the VPN there is 2 tunnels need to be created one is isakmp and the other is the IPsec tunnel which is phase 2.

for these tunnels to be created there is 9 packets need to be exchanged till the VPN is up, 6 packets in phase1 and 3 packets in phase 2.

remember that the VPN is a tale of two tunnels

More Questions Like This