· web viewtunneling process requires internet protocols, carrier protocols and encapsulating...

3
Fig: Three types of VPNs to and from a headquarter organization Tunneling and Point to Point Protocol (PPP) A connection that forms a virtual network is called a tunnel. Tunneling is a process of encapsulating packets and sending them over the public network. Point-to-Point connections are used to create tunnels through the internet. When employees of a company are located outside of main office over different cities they used to create tunnels. Tunneling connections need to be secure since they run over the internet. Tunnelin g proces s requir es intern et protocol s, carri er protoco ls andencapsulati ng protoco ls.

Upload: nguyenque

Post on 11-May-2019

219 views

Category:

Documents


0 download

TRANSCRIPT

protocols. encapsulating and protocols carrier protocols, internet requires process Tunneling

Tunneling connections need to be secure since they run over the internet. they used to create tunnels. When employees of a company are located outside of main office over different cities Point-to-Point connections are used to create tunnels through the internet. encapsulating packets and sending them over the public network. A connection that forms a virtual network is called a tunnel. Tunneling is a process of

Tunneling and Point to Point Protocol (PPP)

Fig: Three types of VPNs to and from a headquarter organization

v Companies can create their own VPNs to remote employees and distant offices for communication.

v When they establish VPN connection they need to think about security.v Using firewalls, encryption system, IPsec features and authentication server they can

provide a well protected virtual private network.

1. firewall: a firewall acts as an effective barrier between private network and the internet.

2. Encryption System: these systems are used to hide the original information by giving some other representation to it.

Security in VPNs

Figure: A point-to-point protocol (PPP) UDP tunnel connection

Fig: protocol packet tunneling through the Internet

offices communicate each other. When R2 receives these packets it decapsulates and sends them to office 2, thus two transport layer UDP datagrams to transmit them to IP Gateway R2. The IP Gateway R1 on office 1 listens for X-type packets and encapsulates them in X-type packet cannot run over the internet directly. Suppose office 1 and office 2 use their own networking protocols denoted by X. using tunnels.

the through connected offices two of LANs two shows below figure The internet

Encapsulating protocols, though which data is wrapped, encapsulated and secured. 2.Carrier protocols, through which information travels over the public network 1.

www.allsyllabus.com