A well-designed VPN can greatly benefit a  company. For example,  it can:  
- Extend geographic connectivity
 - Improve security
 - Reduce operational costs versus traditional WAN
 - Reduce transit time and transportation costs for remote users
 - Improve productivity
 - Simplify network topology
 - Provide global networking opportunities
 - Provide telecommuter support
 - Provide broadband networking compatibility
 - Provide faster ROI (return on investment) than traditional WAN
 
What features are needed in a well-designed VPN? It should  incorporate:  
- Security
 - Reliability
 - Scalability
 - Network management
 - Policy management
 
 A VPN supports at least three different modes of use:
Benefit : Significant cost savings by  reducing the    burden of long distance charges associated with dial-up access. Also  helps    increase productivity and peace of mind by ensuring secure network  access    regardless of where an employee physically is.
Benefit : Substantial cost savings over    traditional leased-line or frame relay technologies through the use of     Internet to bridge potentially long distances between sites.
Benefit : Businesses enjoy the same  policies as a    private network, including security, QoS, manageability, and  reliability.
The packets will encapsulated with tunneling protocol,later packet will De-encapsulted at client.
Tunneling Protocols
1.PPTP - point to point tunneling protocol. working L2
Developed microsoft and security issues.
2.L2TP -Layer 2 tunneliny - woring in l2
Enhanced PPTP with security features by cisco -
3. IP sec - working @ L3
4.Socks
These protocols will do encryption and authentication.IPSEC -
Encrytption - DES,3DES,MD5 DH ( Diffe Helman )
Authentication : SHA1,MD5,RSA
crypto ipsec transform-set
<name> ah-md5-hmac esp-des
show crypto isakmp sa
 
VPN tunneling 
 logical connection to Client and server.The packets will encapsulated with tunneling protocol,later packet will De-encapsulted at client.
Tunneling Protocols
1.PPTP - point to point tunneling protocol. working L2
Developed microsoft and security issues.
2.L2TP -Layer 2 tunneliny - woring in l2
Enhanced PPTP with security features by cisco -
3. IP sec - working @ L3
4.Socks
These protocols will do encryption and authentication.IPSEC -
Encrytption - DES,3DES,MD5 DH ( Diffe Helman )
Authentication : SHA1,MD5,RSA
crypto ipsec transform-set
<name> ah-md5-hmac esp-des
show crypto isakmp sa