Professional Documents
Culture Documents
Lab: Configuration of Ipsec VPN: Vpns Are Used Generally For
Lab: Configuration of Ipsec VPN: Vpns Are Used Generally For
A Virtual Private Network (VPN) provides a secure tunnel across a public network such as
Internet. for organizations to connect users and offices together, without the high costs of
dedicated leased lines.
Client VPNs (Remote Access VPN)- To connect Office to home or “roaming” users
Site-to-Site VPNs - To connect branch offices to a head office.
5. OpenVPN:
IPSec:
IPSEC (Internet Protocol Security), is a suite of protocols, helps us to protect IP traffic on the
network layer.
IPSEC Framework
Confidentiality (Encryption)
On the sending side data is encrypted and on the receiving side data needs to be decrypted.
There are mainly two type’s encryption/decryption keys:
Symmetric keys:
The same key is used to both encrypt and decrypt data. that is, the same key is used to
encrypt a packet (sending device) and to decrypt the packet (receiving device).
Examples of keys:
Asymmetric keys:
In this case two separate keys are required. One for encryption (the public key) and other is
for decryption (the private key).
Public keys are openly exchanged but Private keys are never exchanged.
........................CONTINUES.............................