Using the example of the user in Vienna and Las Vegas, why would we ever want to use a VPN between the two? We do have other options for connectivity. We also use integrity checking to make sure that our VPN is correctly seeing the packets as they were sent from the other side of the VPN and that they are not being altered or manipulated maliciously along the path. The confidentiality provided by the encryption could also represent the P in VPNs. Therefore, in addition to most VPNs, we add the ingredients of confidentiality and data integrity so that not anyone who is eavesdropping can make sense of the data because it is encrypted and they do not have the keys required to decrypt or unlock the data to see what the data actually is. Unfortunately, if we did have a VPN established between two devices over the Internet, what would prevent an individual who had access to the packets fromĮavesdropping on the conversation? The answer is not much, by default. Therefore, there are the basics for VPN, a virtual private network. The virtual network we could create between our two users in Las Vegas and Vienna would be private between those two parties. For example, one user may be connected to the Internet in location, another user may be connected to the Internet in Vienna, Austria, and we could build a logical network, or virtual network, between the two devices using the Internet as our Transport mechanism. The word virtual in VPN refers to a logical connection between the two devices. In either case, a network is providing the basic connectivity between the Two. Those two devices could be computers on the same local-area network or could be connect over a wide area Network. If we break down the term virtual private network into its individual components, we could say that a network allows connectivity between two devices. KeywordsVPN IPSec Packet Tracer Tunnel CCNA.
This paper shows how we can implement the Virtual private network with Cisco provided tool Packet Tracer which is aan integrated simulation, visualization, collaboration, and assessment environment for networking novices to design, configure, and troubleshoot computer networks at a CCNA- level of complexity. It provides a framework for configuring secure VPN. IPSec has become a much more popular VPN security. There are many different types of VPN technologies available such as Internet Protocol Security, SSL, MPLS, L2F, PPTP, L2TP and GRE. It cannot guarantee that the information remains secure while traversing the tunnel. Implementing Virtual Private Network using Ipsec FrameworkĪL-Iraqia University Administration and Economic Collegeīaghdad University College of Medicine: IT unitĪbstractVirtual Private Network used to create an end- to-end tunnel over third-party networks such as the Internet or extranets.