VPN (virtual private network)
A virtual private network (VPN) is programming that
creates a safe and encrypted connection over a less secure network, such as the
public internet. A VPN works by using the shared public infrastructure while
maintaining privacy through security procedures and tunneling protocols. In effect,
the protocols, by encrypting data at the sending end and decrypting it at the
receiving end, send the data through a "tunnel" that cannot be
"entered" by data that is not properly encrypted. An additional level
of security involves encrypting not only the data, but also the originating and
receiving network addresses
1. IPSec – Internet Protocol Security
Internet Protocol security is a procedure for keeping the
records safe from a complete gateway of network and host-to-host communication.
It’s a way to protect the IP network of end-to-end users. IPSec enhances the
connection security providing the public/private keys to lock/unlock the data;
these keys are helpful in encryption and decryption mode.
The IPSec develops an authentication scheme to have a proper
check on the individual connection. The data which is sending or receiving
divides into packets and each pack have to pass under the encryption step.
Therefore, two modes are available in IPSec, i.e. Transfer mode and tunnel
mode, transfer mode encrypts the data and tunnel hides data passage.
2. L2TP
– Layer 2 Tunneling Protocol
Layer 2 Tunnelling Protocol is a tunnelling protocol that
provides shelter to an entire network. L2TP doesn’t heel the encryption and
authentication for data confidentiality, but it works with other VPN protocols
like IPsec, the IPSec takes out the encrypted and authenticated data then L2TP
develops a safe and secure channel between two networks.
L2TP works with exchanging of data packets between two peer,
if one peer is requesting to establish a tunnel, L2TP starts to create the
tunnel generation session when the data frames get empowered to travel on a
secure shell. Once a tunnel is rooted then bidirectional traffic on the
internet is allowed to pass smoothly without any fear.
3. PPTP
– Point-To-Point Tunnelling Protocol
A point-to-point Tunnelling protocol is a duet combination
of Point-To-Point Protocol (PPP), and it’s interrelation with Tunnelling
Protocol. It was the product of Microsoft. PPTP has become a most suitable VPN
protocol nowadays because it ensures the security of Virtual Network through
other versatile conventions.
PPTP implements two actions for network security. Firstly, a
tunnel is made between two disburse network, and the data that has to be driven
from this tunnel is authenticated and encrypted. Point-To-Point protocol
performs the authentication and encryption on the data, then this encapsulated
form of data can easily pass from the tunnel.
4. SSL –
Secure Socket Layer
Secure socket layer protocol and transport layer protocol
are the cryptographic protocols which work for security on the HTTP request.
Different applications like websites and chat messenger are aimed to have a
secure connection between the browser and the application server. HTTPS
securely establish the relationship of a web browser to an application server.
SSL and TLS work with data authentication by the use of
crucial mutual generation, these public keys are allowed to use at both
encrypting and decrypting the request details, encryption is performed when the
request is about to send by the browser, similarly, decryption is achieved when
the application is about to receive by the server.
Site-to-Site VPN
Site-to-site VPN typically creates a direct, unshared and
secure connection between two end points. Site-to-site VPN can be intranet
based or extranet based. Intranet-based site-to-site VPN is created between an
organization's propriety networks, while extranet-based site-to-site VPN is
used for connecting with external partner networks or an intranet.
The connection in a site-to-site VPN is generally enabled
through a VPN gateway device.
No comments:
Post a Comment