Académique Documents
Professionnel Documents
Culture Documents
VPN (Virtual Private Network) Definition: VPN meaning that it is a private point-to-point connection
between two machines or networks over a shared or public network such as the internet. A Virtual Private
Network is a combination of software and hardware. VPN (Virtual Private Network) technology, can be
use in organization to extend its safe encrypted connection over less secure internet to connect remote
users, branch offices, and partner private, internal network. VPN turn the Internet into a simulated private
WAN.
It uses “virtual” connections routed through the internet from a business’s private network to the
remote site. A Virtual Private Network is a technology which creates a network, and that
network is virtually private.
The letter V in VPN stands for “virtual” means that it shares physical circuits with other traffic
and it has no corresponding physical network.
For example, suppose there is a company which has two locations, one in Noida and other in
Pune. For both places to communicate efficiently, the company has the choice to set up private
lines between the two locations. Although private lines would restrict public access and extend
the use of their bandwidth, it will cost the company a great deal of money since they would have
to purchase the communication lines per mile. So, the more viable option is to implement a VPN.
The company can hook their communication lines with a local ISP in both cities. Thus, the ISP
would act as a middleman, connecting the two locations. This would create an affordable small
area network for the company.
A VPN client uses TCP/IP protocol, that is called tunneling protocols, to make a virtual call to
VPN server.
• Intranet VPN can link corporate headquarters, remote offices and branch offices over a shared
infrastructure using dedicated connections.
• If we use intranet VPN, then it reduces the WAN bandwidth costs.
• The user can also connect new sites easily by using this network.
Extranet VPN ( Virtual Private Network)
• If a company has the close relationship with the other company (that company can be their
customer, supplier, branch and another partner company), then those companies can build an
extranet VPN so that they can connect LAN of one company to the other. It allows all of the
companies to work in a shared environment.
• The extranet VPN facilitates e-commerce.
Type of VPN (Virtual Network Protocols)
There are three network protocols are used within VPN tunnels.That are:
Internet Protocol Security (IPSec)
We can make use of this protocol for encryption. It is used as a protocol suite. It is used as a
“protocol suite for securing Internet Protocol (IP) communications by authenticating and
encrypting each packet of IP of a data stream.” It requires expensive, time-consuming client
installations, which is its most significant disadvantage.
Point-to-Point Tunneling Protocol (PPTP)
Generally, it is the most widely used VPN protocol among windows users. It was created by
Microsoft in association with the other technology companies. The most significant disadvantage
of PPTP is that it does not provide encryption. It relies on PPP (Point-to-Point Protocol). It is
implemented for the security measures. It is also available for Linux and Mac users. As
compared to other methods, PPTP is faster.
Layer 2 Tunneling Protocol (L2TP)
It is another tunnelling protocol which supports VPN. L2TP is created by Microsoft and Cisco as
a combination between PPTP and L2F (Layer 2 Forwarding). L2TP also does not provide
encryption as like as PPTP. The main difference between both of them is that L2TP delivers data
confidentiality and data integrity.
Secure Socket Layer (SSL)
It is a VPN accessible via https over a web browser. Its most significant advantage is that it
doesn’t need any software installed because it uses the web browser as the client application.
With the help of SSL VPN, the user’s access can be restricted to specific claims instead of
allowing access to the whole network.
Equipment of VPN
Equipment having the VPN function includes routers and firewalls.Basically, communication is
made via VPN equipment. Information is encrypted by the transmission VPN equipment before
transmission and decoded by the receiving VPN equipment after receipt of information. The key
for encrypt the data is set in VPN equipment in advance. The VPN equipment at receiving side
decodes encrypted data before sending it to the receiving computer.
The advantages of encryption by way of cryptography may be looked into other services, such as
1. Assuring integrity check: This ensures that undesirable person has not tampered data delivered
to the destination during transmission.
2. Providing authentication: Authentication authorizes the sender identity.
Benefits of VPN
The main benefit of a VPN is the potential for significant cost savings compared to traditional
leased lines or dial up networking. These savings come with a certain (in amount of risk,
however, particularly when using the public Internet as the delivery mechanism for VPN data.
The performance of a VPN will be more unpredictable and generally slower than dedicated lines
due to public Net traffic. Likewise, many more points of failure can affect a Net-based VPN than
in a closed private system. Utilizing any public network for communications naturally raises new
security concerns not present when using more controlled environments like point-to-point
leased lines.
• Reliability: Employees and remote offices should be able to connect to VPN. The virtual
network should provide the same quality of connection for each user even when it is handling the
maximum number of simultaneous connections.
• Cost Savings: Its operational cost is less as it transfers the support burden to the service
providers.
It reduces the long-distance telephone charges.
• It cut technical support.
• It eliminates the need for expensive private or leased lines.
• Its management is straightforward.
• Scalability: growth is the flexible, i.e., we can easily add new locations to the VPN.
•It is efficient with broadband technology.
• By using VPN, the equipment cost is also reduced.
• For VPN network to establish, we require an in-depth understanding of the public network
security issues.
• VPNs need to accommodate complicated protocols other than IP.
• There is a shortage of standardisation. The product from different vendors may or may not
work well together.
• The reliability and performance of an Internet-based private network depend on uncontrollable
external factors, which is not under an organisation’s direct control.