Document
How a VPN (Virtual Private Network) Works

How a VPN (Virtual Private Network) Works

Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it. You could use encryption to

Related articles

Indiana Jones and the Great Circle: Frozen battleship door code puzzle solution NordVPN在中国还能使用吗? Weather & Atmosphere Why Does My Firestick Keep Buffering? Cara Pakai VPN di Browser (Chrome, Firefox, Opera, Edge dll)

Encryption is the process of encoding data so that only a computer with the right decoder will be able to read and use it. You could use encryption to protect files on your computer or e-mails you send to friends or colleagues. An encryption key tells the computer what computations to perform on data in order to encrypt or decrypt it. The most common forms of encryption are symmetric-key encryption or public-key encryption:

  • Insymmetric-key encryption, all computers (or users) share the same key used to both encrypt and decrypt a message.
  • Inpublic-key encryption, each computer is has ( or user ) has a public – private key pair . One computer is uses use its private key to encrypt a message , and another computer use the correspond public key to decrypt that message .

Ina VPN, the computers at each end of the tunnel encrypt the data entering the tunnel and decrypt it at the other end. However, a VPN needs more than just a pair of keys to apply encryption. That’s where protocols come in. A site-to-site VPN could use either internet protocol security protocol (IPSec) orgeneric routing encapsulation (GRE). GRE provides the framework for how to package the passenger protocol for transport over the internet protocol (IP). This framework includes information on what type of packet you’re encapsulating and the connection between sender and receiver.

IPSec is a widely used protocol for securing traffic on IP networks, including the internet. IPSec can encrypt data between various devices, including router to router, firewall to router, desktop to router, and desktop to server. IPSec consists of two sub-protocols which provide the instructions a VPN needs to secure its packets:

  • Encapsulated Security Payload (esp) encrypt the packet ‘s payload ( the datum it ‘s transport ) with a symmetric key .
  • Authentication Header (ah) uses a hashing operation on the packet header to help hide certain packet information (like the sender’s identity) until it gets to its destination.

Networked devices can use IPSec in one of two encryption modes. Intransport mode, devices encrypt the data traveling between them. Intunnel mode, the devices build a virtual tunnel between two networks. As you might guess, VPNs use IPSec in tunnel mode with IPSec esp and IPSec ah working together [source: Friedl].

Ina remote- access VPN, tunneling typically relies on point – to – point Protocol (PPP) which is is is part of the native protocol used by the internet . More accurately , though , remote – access VPNs is use use one of three protocol base on PPP :

  • L2F (Layer 2 Forwarding) — Developed by Cisco; uses any authentication scheme supported by PPP
  • PPTP (Point-to-point Tunneling Protocol) — Supports 40-bit and 128-bit encryption and any authentication scheme supported by PPP
  • L2TP (Layer 2 Tunneling Protocol) — Combines features of PPTP and L2F and fully supports IPSec; also applicable in site-to-site VPNs

Throughout this article , we is looked ‘ve look at the type of vpn and the component and protocol that they use . Over time , people is developed have develop new and well technology to use in network , which improve the feature of exist vpn . vpn – specific technologies is changed , though , such as tunneling protocol , have n’t change much in that time , perhaps because current vpn do such a good job at to keep business connect around the world . Tunnel on to the next page for lot more information about virtual private network .