Virtual private networks (VPNs) provide a secure connection over public networks by encrypting data transmission. VPNs use encryption and authentication to securely transmit data across unsecured networks like the internet. There are two main types of VPNs - transport mode VPNs encrypt only the data portion of network packets, while tunnel mode VPNs encrypt the entire client packet.
Activity 2-unit 2-update 2024. English translation
Virtual Private Network: Secure Connections Over Public Networks
1.
2. VIRTUAL PRIVATE NETWORK
is a private and secure network connection
between systems that uses the data
communication capability of an unsecured and
public network.
3. Uses leased circuits from a service provider and conducts packet switching over
these leased circuits.
use security protocols and encrypt traffic transmitted across unsecured
public network like the network.
combines the two, providing encrypted transmissions(like secure VPN) over some
or all of a trusted VPN network.
4. Encapsulation of incoming and outgoing data,
wherein the native protocol of the client is
embedded
Encryption of incoming and outgoing data to
keep the data contents private
Authentication of the remote computer and
perhaps, the remote user as well.
5. TRANSPORT MODE VPN
The data within an IP packet is encrypted but the header information
is not.
This allows the user to establish a secure link directly with the
remote host encrypting only the data contents of the packet.
The downside to this implementation is that packet eavesdroppers
can still identify the destination system.
Once an attacker knows the destination, he or she maybe able to
compromise one of the end nodes and acquire the packet
information from it.
On the other hand, transport mode eliminates the need for special
servers and tunneling software and allows the end users to transmit
traffic anywhere.
6. i)
Two end users can communicate directly,
encrypting and decrypting their
communications as needed.
Each machine acts as the end node VPN
server and client.
7. ii)
This allows the teleworker’s system to work as if it were
part of the local area network.
Ex: the VPN server as an intermediate node, encrypting
traffic from the secure intranet and transmitting it to the
remote client and decrypting traffic from the remote client
and transmitting it to its final destination.
8. Tunel Mode VPN
• The organization establishes two perimeter
tunnel servers that encrypt all traffic that will
traverse an unsecured network.
• The entire client packet is encrypted and
added as the data portion of a packet
addressed from one tunneling server and to
another.
• The receiving server decrypts, the packet and
sends it to the final address.
9. • The primary benefit to this model is that an
intercepted packet reveals nothing about the
true destination system.
• Ex: tunnel mode VPN is provided with
Microsoft’s Internet Security and Acceleration
(ISA) Server.
10. CONCLUSION
• Virtual private network technology can be
used to enable remote offices and users to
connect to private networks securely over
public networks.