https://forum.edugorilla.com/wp-content/uploads/sites/12/2019/05/vpn-gre-series-chapter-4-vpn-tunnel-types-functions-in-english.jpg



Chapter 1 VPN Tunnel in English
URL: https://youtu.be/kJRNnr_HID4

Chapter 2 SITE to SITE VPN in ENGLISH
URL: https://youtu.be/l3PdvqxcX_0

Chapter 3 Remote Access VPN in ENGLISH
URL: https://youtu.be/j1ygONtOAj

VPN Tunnel Theory:

Understanding the concept of VPN is very IMPORTANT.
If VPN LOGIC is clear the it would be very easy to understand how we create a VIETUAL or a LOGICAL Tunnel.

We use INTERNET as a backbone N/W on which VPN is LOGICALLY created.

Since INTERNET can be used by any their are chances that our data can be CRACKED or LEAKED. Since we are SENDING & RECEIVING our PRIVATE DATA over PUBLIC INTERNET. So how is the DATA PROTECTED?

VPN are comming for our RESCUE.
We put our PRIVATE DATA inside the TUNNEL that ENCRYPTS the DATA if & only if IP SEC VPN is used.

IP SEC VPN only supports UNICAST Data Packet.

On N/W we have multiple DATA Traffic types.
VPN GRE Tunnel will ENCAPSULATE the different DATA Traffic Patterns & put inside the VPN GRE Tunnel.

The resultant VPN GRE Tunnel packet is a UNICAST Packet.

VPN GRE Tunnel do not provide SECURITY.

Combining IP SEC VPN Tunnel & VPN GRE Tunnel is IMPORTANT.
So VPN GRE Tunnel i.e. UNICAST Packet is put inside the IP Sec VPN Tunnel.

source

Fill this form and get best deals on " Coaching classes"

  • 100% genuine institutes aiming to help you ace studies
  • Get immediate response from the institutes
  • Compare institutes and pick only the best!
  • Feel free to choose the institute you like, and rest will be taken care of
Verify Yourself




Log in with your credentials

or    

Forgot your details?

Create Account