Intro to Networking - Virtual Private Networks & Tunneling

 Overview


 This introductory article explains what Virtual Private Networks (VPNs) are used for, the two main categories of VPNs, as well as how tunneling works.

Table of Contents


  1. What are VPNs?
  2. What is Tunneling?
  3. Tunneling Analogy
  4. Related Articles

What are VPNs?


Back to Top

Virtual Private Networks, or, VPNs, provide a way for Hosts to communicate within a Local Area Network from outside the Physical LAN boundaries; which practically includes, the Internet.

VPNs are generally categorized by either of two types:

  • Remote Access
  • Site-to-Site

In a Remote-Access VPN Scenario, a VPN Client, such as a Laptop or Smartphone, establishes a remote connection to a VPN Server, such as a Router, in order for the Client to communicate on the LAN from say, across the Internet.

vpn-remote-diagram.png
Remove-Access VPN 

Under a Site-to-Site VPN Scenario, two or more VPN Routers create end-to-end connections in order to allow LAN traffic to traverse the WAN.

vpn-site-to-site-diagram.png
Site-to-Site VPN

What is Tunneling?


Back to Top

In both scenarios, VPN Traffic reaches the intended Network Endpoint through a process called Tunneling.

Tunneling surrounds the original IP Packet with an extra layer of encapsulation, called the Passenger Protocol, to help the data successfully traverse the WAN inconspicuously with the help of encryption protocols. 

ip-packet-internet-end-to-end.png
Normal IP packet routing from end-to-end without tunneling.

 

vpn-tunneling-diagram.png
 Site-to-Site VPN illustrates tunneling from end-to-end.  

 


Tunneling Analogy


Back to Top

Take a look at the analogy below. Tunneling is analogous to a Moving Company that helps load and unload Boxed Furniture to the new Home.

  • The Furniture is the Application-Layer Data.
  • The Box is the IP Packet.
  • The Moving Truck loads the Box for Shipment, similar to how a Tunnel’s Passenger Protocol encapsulates the Original IP Packet for transport.
  • The Moving Truck transports the Boxed Furniture across a series of highways—that is the Internet, stopping occasionally at Gas Stations (that are Routers), for directions.
  • Upon arrival, the Moving Truck unloads the Box, similar to how the Tunnel Endpoint strips off the Passenger Protocol, leaving the Original IP Packet now at its intended LAN destination.
vpn-analogy-truck-tunneling.png
Moving Company trucks are analogous to tunneling protocols.

 


Related Articles


Back to Top

UniFi - L2TP Remote Access VPN with USG as RADIUS Server

Powered by Zendesk