VPN (virtual private network)

VPN (virtual private network)

 A virtual private network (VPN) is programming that creates a safe and encrypted connection over a less secure network, such as the public internet. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols. In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a "tunnel" that cannot be "entered" by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses

1.       IPSec – Internet Protocol Security

Internet Protocol security is a procedure for keeping the records safe from a complete gateway of network and host-to-host communication. It’s a way to protect the IP network of end-to-end users. IPSec enhances the connection security providing the public/private keys to lock/unlock the data; these keys are helpful in encryption and decryption mode.

The IPSec develops an authentication scheme to have a proper check on the individual connection. The data which is sending or receiving divides into packets and each pack have to pass under the encryption step. Therefore, two modes are available in IPSec, i.e. Transfer mode and tunnel mode, transfer mode encrypts the data and tunnel hides data passage.

2.        L2TP – Layer 2 Tunneling Protocol

Layer 2 Tunnelling Protocol is a tunnelling protocol that provides shelter to an entire network. L2TP doesn’t heel the encryption and authentication for data confidentiality, but it works with other VPN protocols like IPsec, the IPSec takes out the encrypted and authenticated data then L2TP develops a safe and secure channel between two networks.

L2TP works with exchanging of data packets between two peer, if one peer is requesting to establish a tunnel, L2TP starts to create the tunnel generation session when the data frames get empowered to travel on a secure shell. Once a tunnel is rooted then bidirectional traffic on the internet is allowed to pass smoothly without any fear.

3.        PPTP – Point-To-Point Tunnelling Protocol

A point-to-point Tunnelling protocol is a duet combination of Point-To-Point Protocol (PPP), and it’s interrelation with Tunnelling Protocol. It was the product of Microsoft. PPTP has become a most suitable VPN protocol nowadays because it ensures the security of Virtual Network through other versatile conventions.

PPTP implements two actions for network security. Firstly, a tunnel is made between two disburse network, and the data that has to be driven from this tunnel is authenticated and encrypted. Point-To-Point protocol performs the authentication and encryption on the data, then this encapsulated form of data can easily pass from the tunnel.

4.        SSL – Secure Socket Layer

Secure socket layer protocol and transport layer protocol are the cryptographic protocols which work for security on the HTTP request. Different applications like websites and chat messenger are aimed to have a secure connection between the browser and the application server. HTTPS securely establish the relationship of a web browser to an application server.

SSL and TLS work with data authentication by the use of crucial mutual generation, these public keys are allowed to use at both encrypting and decrypting the request details, encryption is performed when the request is about to send by the browser, similarly, decryption is achieved when the application is about to receive by the server.

 Site-to-Site VPN

Site-to-site VPN typically creates a direct, unshared and secure connection between two end points. Site-to-site VPN can be intranet based or extranet based. Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.

The connection in a site-to-site VPN is generally enabled through a VPN gateway device.


No comments:

Post a Comment