SlideShare a Scribd company logo
1 of 2
Download to read offline
How Internet VPN works
The function of virtual private network (VPN) is to establish a private network on the
public network for encrypted communication. It is widely used in enterprise network.
VPN gateway realizes remote access by encrypting data packet and converting data
packet target address. VPN can be realized by server, hardware, software and other
means.
VPN belongs to remote access technology. In short, it is to use public network to set
up private network. For example, when an employee of a company is on a business
trip, he wants to access the server resources of the enterprise intranet. This access
belongs to remote access.
How VPN works
Generally, the VPN gateway adopts a dual network card structure, and the external
network card uses public network IP to access the Internet.
Terminal a of network 1 (assumed to be the public Internet) accesses terminal B of
network 2 (assumed to be the corporate intranet), and the destination address of the
access packet sent by it is the internal IP address of terminal B.
When receiving the access data packet sent by terminal a, the VPN gateway of
network 1 checks its target address. If the target address belongs to the address of
network 2, the data packet is encapsulated in different ways according to the VPN
technology adopted. At the same time, the VPN gateway will construct a new VPN
data packet and take the encapsulated original data packet as the load of VPN data
packet, The destination address of VPN packet is the external address of VPN
gateway of network 2.
The VPN gateway of network 1 sends the VPN packet to the Internet. Since the target
address of the VPN packet is the external address of the VPN gateway of network 2,
the packet will be correctly sent to the VPN gateway of network 2 by the route in the
Internet.
The VPN gateway of network 2 checks the received data packet. If it is found that the
data packet is sent from the VPN gateway of network 1, it can determine that the
data packet is a VPN data packet, and unpack the data packet. The unpacking process
is mainly to peel off the packet header of VPN packet, and then reverse process and
restore the packet to the original packet.
The VPN gateway of network 2 sends the restored original data packet to the target
terminal B. since the target address of the original data packet is the IP of terminal B,
the data packet can be correctly sent to terminal B. In the view of terminal B, the
data packets it receives are the same as those sent directly from terminal a.
The packet processing process from terminal B to terminal A is the same as the
above process, so that the terminals in the two networks can communicate with
each other
Through the above description, it can be found that two parameters are very
important for VPN communication when the VPN gateway processes data packets:
the target address of the original data packet (VPN target address) and the remote
VPN gateway address. According to the VPN target address, the VPN gateway can
judge which data packets are processed by VPN. Generally, the data packets that do
not need to be processed can be directly forwarded to the superior route; The
remote VPN gateway address specifies the destination address of the processed VPN
packet, that is, the VPN gateway address at the other end of the VPN tunnel. Because
the network communication is bidirectional, during VPN communication, the VPN
gateways at both ends of the tunnel must know the VPN target address and the
corresponding remote VPN gateway address.
Visit E-Lins Technology for more information.

More Related Content

Similar to How Internet VPN works

Similar to How Internet VPN works (20)

p2p
p2pp2p
p2p
 
Week10
Week10Week10
Week10
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
 
Vpn
VpnVpn
Vpn
 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
Vpn
VpnVpn
Vpn
 
Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4
 
MOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptxMOBILE COMPUTING Unit 2.pptx
MOBILE COMPUTING Unit 2.pptx
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Unit 3
Unit 3Unit 3
Unit 3
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 4 MC QA.pdf
Unit 4 MC  QA.pdfUnit 4 MC  QA.pdf
Unit 4 MC QA.pdf
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

How Internet VPN works

  • 1. How Internet VPN works The function of virtual private network (VPN) is to establish a private network on the public network for encrypted communication. It is widely used in enterprise network. VPN gateway realizes remote access by encrypting data packet and converting data packet target address. VPN can be realized by server, hardware, software and other means. VPN belongs to remote access technology. In short, it is to use public network to set up private network. For example, when an employee of a company is on a business trip, he wants to access the server resources of the enterprise intranet. This access belongs to remote access. How VPN works Generally, the VPN gateway adopts a dual network card structure, and the external network card uses public network IP to access the Internet. Terminal a of network 1 (assumed to be the public Internet) accesses terminal B of network 2 (assumed to be the corporate intranet), and the destination address of the access packet sent by it is the internal IP address of terminal B. When receiving the access data packet sent by terminal a, the VPN gateway of network 1 checks its target address. If the target address belongs to the address of network 2, the data packet is encapsulated in different ways according to the VPN technology adopted. At the same time, the VPN gateway will construct a new VPN data packet and take the encapsulated original data packet as the load of VPN data packet, The destination address of VPN packet is the external address of VPN gateway of network 2. The VPN gateway of network 1 sends the VPN packet to the Internet. Since the target address of the VPN packet is the external address of the VPN gateway of network 2, the packet will be correctly sent to the VPN gateway of network 2 by the route in the Internet. The VPN gateway of network 2 checks the received data packet. If it is found that the data packet is sent from the VPN gateway of network 1, it can determine that the data packet is a VPN data packet, and unpack the data packet. The unpacking process is mainly to peel off the packet header of VPN packet, and then reverse process and restore the packet to the original packet. The VPN gateway of network 2 sends the restored original data packet to the target terminal B. since the target address of the original data packet is the IP of terminal B, the data packet can be correctly sent to terminal B. In the view of terminal B, the data packets it receives are the same as those sent directly from terminal a. The packet processing process from terminal B to terminal A is the same as the above process, so that the terminals in the two networks can communicate with each other Through the above description, it can be found that two parameters are very
  • 2. important for VPN communication when the VPN gateway processes data packets: the target address of the original data packet (VPN target address) and the remote VPN gateway address. According to the VPN target address, the VPN gateway can judge which data packets are processed by VPN. Generally, the data packets that do not need to be processed can be directly forwarded to the superior route; The remote VPN gateway address specifies the destination address of the processed VPN packet, that is, the VPN gateway address at the other end of the VPN tunnel. Because the network communication is bidirectional, during VPN communication, the VPN gateways at both ends of the tunnel must know the VPN target address and the corresponding remote VPN gateway address. Visit E-Lins Technology for more information.