VPN Information
What is a VPN?
VPN Connection Types
VPN Protocols
Mesh VPN
Hub Spoke VPN
 
 
 
 
 
 
 
 
 
 
VPN Information
What is a VPN?

A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. With a VPN, you can send data between two computers across a shared or public network in a manner that emulates a point-to-point private link. Virtual private networking is the act of creating and configuring a virtual private network.

To emulate a point-to-point link, data is encapsulated, or wrapped, with a header that provides routing information, which allows the data to traverse the shared or public network to reach its endpoint. To emulate a private link, the data is encrypted for confidentiality. Data that is intercepted on the shared or public network is indecipherable without the encryption keys. The link in which the private data is encapsulated and encrypted is a VPN connection.

VPN connections allow users who work at home or travel to obtain a remote access connection to an organization server using the infrastructure provided by a public network such as the Internet. From the user's perspective, the VPN is a point-to-point connection between the computer, the VPN client, and an organization server (the VPN server). The exact infrastructure of the shared or public network is irrelevant, because it appears as if the data is sent over a dedicated private link.

VPN connections also allow organizations to have routed connections with other organizations over a public network, such as the Internet, while maintaining secure communications (for example, between offices that are geographically separate). A routed VPN connection across the Internet logically operates as a dedicated wide area network (WAN) link.


[Return to top]
VPN Connection Types

There are two types of VPN connections:

Remote access VPN connection
Site-to-site VPN connection

Remote access VPN connection
A remote access client makes a remote access VPN connection that connects to a private network. VPN Server provides access to the entire network to which it is attached, allow the user access to the normal resource that they would have if they where in the office.

Site-to-site VPN connection
A router makes a site-to-site VPN connection that connects two portions of a private network. Site-to-site VPN connections are discussed in this document. A detailed description of a hub-spoke or mesh VPN please click on one of the following links.

Hub-spoke VPN

Mesh VPN

[Return to top]
VPN Protocols

There are three VPN protocols for site-to-site connections:

Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP) over Internet Protocol security (IPsec)
Internet Protocol security (IPsec) tunnel mode

PPTP
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a VPN across TCP/IP-based data networks. PPTP supports on-demand, multi-protocol, virtual private networking over public networks such as the Internet. PPTP allows IP traffic to be encrypted, and then encapsulated in an IP header to be sent across a corporate IP network or a public IP network such as the Internet.
L2TP over IPsec
Layer Two Tunneling Protocol (L2TP) is an industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. L2TP allows IP traffic to be encrypted, and then sent over any medium that supports point-to-point datagram delivery, such as IP. The Microsoft implementation of the L2TP protocol uses Internet Protocol security (IPsec) encryption to protect the data stream from the VPN client to the VPN server. IPsec tunnel mode allows IP packets to be encrypted, and then encapsulated in an IP header to be sent across a corporate IP network or a public IP network such as the Internet.
IPsec
When Internet Protocol security (IPsec) is used in tunnel mode, IPsec itself provides encapsulation for IP traffic only. The primary reason for using IPsec tunnel mode is interoperability with other routers, gateways, or end systems that do not support L2TP over IPsec or PPTP VPN tunneling.


[Return to top]
Mesh VPN

In the mesh VPN scenario, each office is connected to every other office with a VPN connection as shown in the diagram opposite. There is no central office.

A mesh VPN configuration can be used when branch office connectivity to other branch offices is imperative. The primary drawback of the hub and spoke VPN is that if the main office network connection becomes unavailable, connections between the branch offices are lost. The mesh VPN solves this problem by connecting all networks to each other using redundant connections between branch offices and the main office. Multiple paths are then available between any two sites.


[Return to top]
Hub-spoke VPN

In the hub-spoke VPN scenario, each branch communicates over a VPN connection with the main office (the hub) and also communicates with every other branch office (spoke) through its VPN connection with the hub.

A hub and spoke VPN joins all the branch offices to the main office. The main office serves as the hub to which all the branch networks connect. The branch offices can all connect to resources on the main office network using the hub and spoke network connection.

In addition, using a hub and spoke VPN configuration allows the branch networks to communicate with one another by sending their communications through the main office. The main office then routes these connections to the appropriate branch office network. This scenario is shown in the diagram opposite.


[Return to top]