Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.
Once the Internet connection is made, the user creates a VPN connection with the corporate VPN server. If the VPN connection is encrypted
VPN works by encrypting your private communication over Public Internet allowing you to access your Private networks securely.
vpn is used to encrypt the data between network nodes for confidentiality. SSL and IPSEC are the widely used VPN protocols. When the vpn is build between geographical sites called Site-to-Site VPN.
When the vpn is bulld between an end host and site is called remote access vpn.
VPN is conceptualized as a tunnel between two points a source and a destination. This tunnel allows sharing of data between different LAN over a public network securely.
Security in VPN is implemented using IPSec, SSL etc. these features encrypt your data and then send them through the tunnel.
Consider the following scenario you have two sites in two cities and your manager asks you to design a network on which the two sites are able to communicate as if they were in the same building but with much more security. First a VPN(GRE) tunnel is made between the two sites and then IPSec is implemented over the tunnel for security of data over the public network.
well the VPN architecture use the ISAKMP (Internet security for key and management protocol) which is used for phase 1 this protocol provide the encryption, Hash, DH group authentication and lifetime.
the basic idea is that exchange data over public networks such as the internet without any protection is very high risk to protect ur traffic over publick network the VPN is involved.
in the VPN there is 2 tunnels need to be created one is isakmp and the other is the IPsec tunnel which is phase 2.
for these tunnels to be created there is 9 packets need to be exchanged till the VPN is up, 6 packets in phase1 and 3 packets in phase 2.
remember that the VPN is a tale of two tunnels