Overview About Us Services Contact Us
VPN
CONCEPTS
Overview About Us Services Contact Us
WHAT IS A VPN?
A Virtual Private Network (VPN) is a secure, encrypted
connection over a less secure network, typically the
internet. It allows devices to communicate as if they were
on the same local private network, even if they're
physically distant.
Overview About Us Services Contact Us
WHY USE VPNS IN
NETWORKS?
Security: Encrypts data traveling over public networks.
Privacy: Hides user data from ISPs, hackers, and even
governments.
Remote Access: Employees can securely access the
office network from anywhere.
Cost-Effective: Uses public internet instead of
dedicated leased lines.
Overview About Us Services Contact Us
TYPES OF VPNS
Site-to-Site VPN: Connects entire networks (e.g.,
branch office to HQ)
Remote Access VPN:Connects individual users to a
network
SSL VPN: Uses a web browser and HTTPS for secure
access
MPLS VPN: Provided by ISPs using MPLS backbone
Overview About Us Services
SITE-TO-SITE VPN
Overview About Us Services
REMOTE ACCESS
VPN
Overview About Us Services
SSL VPN
Overview About Us Services
MPLS VPN
Overview About Us Services Contact Us
VPN PROTOCOLS
IPsec (Internet Protocol Security)
GRE (Generic Routing Encapsulation)
SSL/TLS VPN
L2TP and PPTP (Legacy Protocols)
Overview About Us Services
VPN PROTOCOLS
IPsec (Internet Protocol Security) GRE (Generic Routing Encapsulation) SSL/TLS VPN L2TP and PPTP (Legacy Protocols)
Most commonly used in Site- A tunneling protocol, but not Uses HTTPS (port 443) to L2TP (Layer 2 Tunneling
to-Site VPNs. secure by itself (no encryption) create a secure tunnel. Protocol): Often combined with
Provides encryption, IPsec for encryption.
authentication, and integrity. Can encapsulate many types of Clientless VPN: Access
Works in two modes: traffic (supports multicast & through a browser. PPTP (Point-to-Point Tunneling
Transport Mode: Encrypts routing protocols). Protocol): Old and insecure,
only the payload. Useful for remote access to rarely used today.
Tunnel Mode (used in Often used together with IPsec web apps.
CCNA): Encrypts the entire to get both tunneling and Not commonly used in modern
packet. encryption:GRE over IPsec. Limited support in routers; enterprise setups
Uses two main phases: more common in firewalls
IKE Phase 1: Builds the and VPN appliances.
initial secure tunnel
(ISAKMP).
IKE Phase 2: Negotiates
IPsec security
associations (SAs).
Integrity (SHA, MD5)
Overview About Us Services Contact Us
IPSEC VPN
COMPONENTS
IKE PHASE 1 & 2
ENCRYPTION (ESP VS AH)
AUTHENTICATION (PRE-SHARED KEY VS DIGITAL CERTIFICATES)
INTEGRITY (SHA, MD5)
Overview About Us Services
THANK YOU