A well-designed VPN can greatly benefit a company. For example, it can:
- Extend geographic connectivity
- Improve security
- Reduce operational costs versus traditional WAN
- Reduce transit time and transportation costs for remote users
- Improve productivity
- Simplify network topology
- Provide global networking opportunities
- Provide telecommuter support
- Provide broadband networking compatibility
- Provide faster ROI (return on investment) than traditional WAN
What features are needed in a well-designed VPN? It should incorporate:
- Security
- Reliability
- Scalability
- Network management
- Policy management
A VPN supports at least three different modes of use:
Benefit : Significant cost savings by reducing the burden of long distance charges associated with dial-up access. Also helps increase productivity and peace of mind by ensuring secure network access regardless of where an employee physically is.
Benefit : Substantial cost savings over traditional leased-line or frame relay technologies through the use of Internet to bridge potentially long distances between sites.
Benefit : Businesses enjoy the same policies as a private network, including security, QoS, manageability, and reliability.
The packets will encapsulated with tunneling protocol,later packet will De-encapsulted at client.
Tunneling Protocols
1.PPTP - point to point tunneling protocol. working L2
Developed microsoft and security issues.
2.L2TP -Layer 2 tunneliny - woring in l2
Enhanced PPTP with security features by cisco -
3. IP sec - working @ L3
4.Socks
These protocols will do encryption and authentication.IPSEC -
Encrytption - DES,3DES,MD5 DH ( Diffe Helman )
Authentication : SHA1,MD5,RSA
crypto ipsec transform-set
<name> ah-md5-hmac esp-des
show crypto isakmp sa
VPN tunneling
logical connection to Client and server.The packets will encapsulated with tunneling protocol,later packet will De-encapsulted at client.
Tunneling Protocols
1.PPTP - point to point tunneling protocol. working L2
Developed microsoft and security issues.
2.L2TP -Layer 2 tunneliny - woring in l2
Enhanced PPTP with security features by cisco -
3. IP sec - working @ L3
4.Socks
These protocols will do encryption and authentication.IPSEC -
Encrytption - DES,3DES,MD5 DH ( Diffe Helman )
Authentication : SHA1,MD5,RSA
crypto ipsec transform-set
<name> ah-md5-hmac esp-des
show crypto isakmp sa