VPN Term Paper
VPN Term Paper
VPN Term Paper
net/publication/289120789
CITATION READS
1 20,698
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Saugat Bhattarai on 03 January 2016.
1. INTRODUCTION:
VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a private
network in the sense that it carries controlled information, protected by various security
mechanisms, between known parties. VPNs are only "virtually" private, however, because this
data actually travels over shared public networks instead of fully dedicated private connections.
The main benefit of a VPN is the potential for significant cost savings compared to traditional
leased lines or dial up networking. These savings come with a certain amount of risk, however,
particularly when using the public Internet as the delivery mechanism for VPN data.
The performance of a VPN will be more unpredictable and generally slower than dedicated lines
due to public Net traffic. Likewise, many more points of failure can affect a Net-based VPN
than in a closed private system. Utilizing any public network for communications naturally
raises new security concerns not present when using more controlled environments like point-
to-point leased lines.
VPNs may save money in several different ways. Companies that lease private lines typically
pay a very high monthly fee, and a VPN can replace these lines with much less expensive,
shorter connections to a local ISP. VPNs can also support remote access connectivity for
travelers. Instead of configuring remote access servers and paying for the long-distance charges
to reach them, an organization can rely on an ISP to support local access on both ends of the
VPN connection.
2. METHODOLOGY:
This topic is chosen in order to become more familiar theoretically in the field of secure
network connection using tunnel. To complete this research I have done the following things:
1. Various articles in the Internet were thoroughly examined and information was collected.
2. Several e-books and books from the library were used to find the content about the topics.
3. Consultation with friends was also done which helped in conduction the research in more
depth.
4. For practical test, I have been through www.vpnforuk.com for testing free VPN service.
3. ANALYSIS:
VPN is growing very fast as the security is the major concern in the world. Modern technology
has shown great changes the way we work few years ago. People started to work remotely and
are seeking more security for their work. So, in upcoming days VPN would be the prime
requirement for every organization and business people. Moreover, those who are sensitive
towards their personal information VPN technology would be their first choice.
4. DISCUSSION:
A virtual private network (VPN) is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with secure
access to their organization's network. A virtual private network can be contrasted with an
expensive system of owned or leased lines that can only be used by one organization. The goal of
a VPN is to provide the organization with the same capabilities, but at a much lower cost
securely through public network.
A VPN works by using the shared public infrastructure while maintaining privacy through
security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP)
along with IPSec (IPSec/L2TP). In effect, the protocols, by encrypting data at the sending end
and decrypting it at the receiving end, send the data through a "tunnel" that cannot be "entered"
by data that is not properly encrypted. An additional level of security involves encrypting not
only the data, but also the originating and receiving network addresses.
1
Virtual Private Network
Why VPN?
As a business grows, it might expand to multiple shops or offices across the country and around
the world. To keep things running efficiently, the people working in those locations need a fast,
secure and reliable way to share information across computer networks. In addition, traveling
employees like salespeople need an equally secure and reliable way to connect to their business's
computer network from remote locations.
One popular technology to accomplish these goals is a VPN (virtual private network). A VPN is
a private network that uses a public network (usually the Internet) to connect remote sites or
users together. The VPN uses "virtual" connections routed through the Internet from the
business's private network to the remote site or employee. By using a VPN, businesses ensure
security -- anyone intercepting the encrypted data can't read it.
single private network, they can create an intranet VPN to connect each separate LAN to a
single WAN.
Extranet-based -- When a company has a close relationship with another company (such as a
partner, supplier or customer), it can build an extranet VPN that connects those companies'
LANs. This extranet VPN allows the companies to work together in a secure, shared network
environment while preventing access to their separate intranets.
4.2.1 Authentication:
Tunnel endpoints must be authenticated before secure VPN tunnels can be established. User-
created remote-access VPNs may use passwords, biometrics, two-factor authentication or
other cryptographic methods. Network-to-network tunnels often use passwords or digital
certificates. They permanently store the key to allow the tunnel to establish automatically,
without intervention from the user.
4.2.2 Tunneling:
Virtual private network technology is based on the idea of tunneling. VPN tunneling involves
establishing and maintaining a logical network connection (that may contain intermediate
hops). On this connection, packets constructed in a specific VPN protocol format are
encapsulated within some other base or carrier protocol, then transmitted between VPN client
and server, and finally de-encapsulated on the receiving side. VPN supports two types of
tunneling - voluntary and compulsory. Both types of tunneling are commonly used.
The three most popular VPN tunneling protocols listed below continue to compete with each other
for acceptance in the industry. These protocols are generally incompatible with each other.
4.2.3 Encryption:
You must use data encryption to provide data confidentiality for the data that is sent between the
VPN client and the VPN server across a shared or public network, where there is always a risk of
unauthorized interception. You can configure the VPN server to force encrypted
communications. Users who connect to that server must encrypt their data or a connection is not
allowed. For VPN connections, the Windows Server 2003 family uses Microsoft Point-to-Point
Encryption (MPPE) with the Point-to-Point Tunneling Protocol (PPTP) and Internet Protocol
security (IPSec) encryption with the Layer Two Tunneling Protocol (L2TP).
Because data encryption is performed between the VPN client and VPN server, data encryption
is not necessary on the communication link between a dial-up client and its Internet service
provider (ISP). For example, a mobile user uses a dial-up connection to dial in to a local ISP.
Once the Internet connection is made, the user creates a VPN connection with the corporate VPN
server. If the VPN connection is encrypted, encryption is not needed on the dial-up connection
between the user and the ISP.
Note: VPN data encryption does not provide end-to-end data encryption. End-to-end encryption
is data encryption between the client application and the server hosting the resource or service
that is accessed by the client application. To get end-to-end data encryption, you can use IPSec to
create a secure connection after the VPN connection is made.
2. The reliability and performance of an Internet-based VPN is not under an organization's direct
control. Instead, the solution relies on an ISP and their quality of service.
4
Virtual Private Network
3. Historically, VPN products and solutions from different vendors have not always been
compatible due to issues with VPN technology standards. Attempting to mix and match equipment
may cause technical problems, and using equipment from one provider may not give as great a cost
savings.
700 40 43 $5.00
vyprVPN
300 47 $6.95
pureVPN
113 74 $10.00
IPVANISH
19 1138 $10.00
PROXIFY
446 7 44 $15.00
STRONGVPN
9 18 9 $9.99
SUNVPN
36 7 32 $13.58
PROVPN
32 9 $4.99
VPN in Touch
21 5 21 $3.31
VPN.SH
5
Virtual Private Network
Step 1:
Connect to a workspace
6
Virtual Private Network
Step 3:
Step 4:
Connecting to vpnforuk.com
7
Virtual Private Network
Step 5:
Network Authentication to connect to VPN connection:
8
Virtual Private Network
5. CONCLUSION:
Network security is one of the trending topics in modern days. As world is more vulnerable,
VPN importance has increased. Business organization nowadays is not limited to one place. So,
they are in need of security in cheap price which can fulfill by using VPN and its modern
tunneling protocol which has been impossible for anyone the go through it.
It has been golden cake for those who work more in public cafe network than sitting in same
place throughout the year. It is giving new name to the security and data transfer through the
internet.
9
Virtual Private Network
Books:
A Guide to Virtual Private Network-to-network, Martin W Muthammer and others,1998
Virtual Private Networks,Charlie Scott, 2000
10