70 likes | 133 Views
Learn how VPNs create secure private networks over the public internet through encryption, tunneling, and various topologies. Delve into the world of VPN technology and ensure your data remains private and protected.
E N D
VPN Kittiphan Techakittiroj engktc@au.ac.th
VPN (Virtual Private Network) • Create a private network over the public network (Internet) • Encrypt packets (layer 2) to become “extranet” http://www.data.com/roundups/images/vpn_servers_figure1.html
VPN Tunneling • Encrypt packets on one network • send encrypted packets over public network • decrypt packets and put it on the other network http://login.samart.co.th/~sanook/report/
VPN VPN Topology • Two main kinds • Lan-to-Lan VPN • Firewall-To-Laptop VPN http://users.vnet.net/ids/vpn/topology.htm
Reference Books Developing Secure Commerce Applications by Online O’Reilly Web Development Courses (http://208.233.153.3/oreilly/security/westnet: 1999)