SlideShare a Scribd company logo
1 of 14
Natting 
NATTING
Private vs Public IP Addresses 
Whatever connects directly into Internet must have 
public (globally unique) IP address 
There is a shortage of public IPv4 address 
So Private IP addresses can be used within a 
private network 
Three address ranges are reserved for private 
usage 
10.0.0.0/8 
172.16.0.0/16 to 172.31.0.0/16 
192.168.0.0/24 to 192.168.255.0/24 
A private IP is mapped to a Public IP, when the 
machine has to access the Internet 
Natting
NAT 
NAT (Network Address Translation) Maps Private 
IPs to Public IPs 
It is required because of shortage of IPv4 Address 
Natting 
H1 
H2 
10.0.1.3 
10.0.1.1 
213.168.112.3 
Private network 1 10.0.1.1 
Router/NAT 
10.0.1.2 
H3 
Router/NAT 
H4 
10.0.1.2 10.0.1.3 
Private network 2 
H5 
Internet 
128.195.4.119 128.143.71.21
NAT 
Static NAT : Maps unique Private IP to unique 
Public IP 
Dynamic NAT : Maps Multiple Private IP to a Pool of 
Public IPs (Port Address Translation : Maps a 
Public IP and Port Number to a service in Private IP) 
Natting 
H1 
Source = 10.0.1.2 
Source port = 2001 
Private address: 10.0.1.2 
Private network 
Source = 128.143.71.21 
Source port = 3200 
NAT 
H2 
Private address: 10.0.1.3 
Source = 10.0.1.3 
Source port = 1090 
Internet 
128.143.71.21 
Source = 128.143.71.21 
Destination = 4444
SNMP 
SNMP
Simple Network Management 
Protocol 
SNMP is a framework that 
provides facilities for 
managing and monitoring 
network resources on the 
Internet. 
Components of SNMP: 
SNMP agents 
SNMP managers 
Management Information 
Bases (MIBs) 
SNMP protocol itself 
SNMP
SNMP 
SNMP is based on the 
manager/agent model 
consisting of a manager, an 
agent, a database of 
management information, 
called as MIB. 
The manager provides the 
interface between the human 
network manager and the 
management system. 
The agent provides the 
interface between the 
manager and the physical 
device(s) being managed. 
SNMP
SNMP 
SNMP uses five basic messages (GET, GET-NEXT, GET-RESPONSE, 
SET, and TRAP) to communicate between the 
manager and the agent. 
The GET and GET-NEXT messages allow the manager to 
request information for a specific variable. The agent, upon 
receiving a GET or GET-NEXT message, will issue a GET-RESPONSE 
message to the manager with either the 
information requested or an error indication as to why the 
request cannot be processed. 
A SET message allows the manager to request a change be 
made to the value of a specific variable in the case of an alarm 
remote that will operate a relay. The agent will then respond 
with a GET-RESPONSE message indicating the change has 
been made or an error indication as to why the change cannot 
be made. 
The TRAP message allows the agent to spontaneously inform 
the manager of an ‘important’ event. 
SNMP
VPN 
VPN
VPN 
VPN is a private connection between two systems 
or networks over a shared or public network 
(typically Internet). 
VPN technology lets an organization securely 
extend its network services over the Internet to 
remote users, branch offices, and partner 
companies. 
In other words, VPN turns the Internet into a 
simulated private WAN. 
VPN is very appealing since the Internet has a 
global presence, and its use is now standard 
practice for most users and organizations. 
VPN
VPN 
VPN
How VPN Works 
To use the Internet as a private Wide Area Network, 
organizations may have to address two issues : 
First, networks often communicate using a variety of 
protocols, such as IPX and NetBEUI, but the Internet 
can only handle TCP/IP traffic. So VPN may need to 
provide a way to pass non-TCP/IP protocols from 
one network to another. 
Second data packets traveling the Internet are 
transported in clear text. Therefore, anyone who can 
see Internet traffic can also read the data contained 
in the packets. This is a problem if companies want 
to use the Internet to pass important, confidential 
business information. 
VPN
How VPN Works 
VPN overcome these obstacles by using a strategy 
called Tunneling. Instead of packets crossing the 
Internet out in the open, data packets are fist 
encrypted for security, and then encapsulated in an 
IP packet by the VPN and tunneled through the 
Internet. 
The VPN tunnel initiator on the source network 
communicates with a VPN tunnel terminator on the 
destination network. The two agree upon an 
encryption scheme, and the tunnel initiator 
encrypts the packet for security. 
VPN
Advantages of Using VPN 
VPN technology provides many benefits. Perhaps 
the biggest selling point for VPN is cost savings. 
One can avoid having to purchase expensive leased 
lines to branch offices or partner companies. On 
another cost-related note, you can evade having to 
invest in additional WAN equipment and instead 
leverage your existing Internet installation. 
Another benefit of VPN is that it is an ideal way to 
handle mobile users. 
VPN

More Related Content

What's hot

designandimplementanetwork
designandimplementanetworkdesignandimplementanetwork
designandimplementanetworkAdi Fang
 
I pv4 subneting
I pv4 subnetingI pv4 subneting
I pv4 subnetingtivang yem
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guideNishant Gandhi
 
IP fundamentals
IP fundamentals IP fundamentals
IP fundamentals sumit singh
 
Internet Protocol Address
Internet Protocol AddressInternet Protocol Address
Internet Protocol Addressadil raja
 
Presentation 1 The Internet
Presentation 1 The InternetPresentation 1 The Internet
Presentation 1 The Internetjeckman1360
 
Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 examreiryuzaki
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAnhMai173354
 
Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...
Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...
Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...Andy Juan Sarango Veliz
 
Report on routing interface configuration
Report on routing interface configurationReport on routing interface configuration
Report on routing interface configurationDebjyotiSaha9
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer routerrishi ram khanal
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 

What's hot (20)

IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
How to make a simple application on packet tracer
How to make a simple application on packet tracerHow to make a simple application on packet tracer
How to make a simple application on packet tracer
 
designandimplementanetwork
designandimplementanetworkdesignandimplementanetwork
designandimplementanetwork
 
I pv4 subneting
I pv4 subnetingI pv4 subneting
I pv4 subneting
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
Ipaddressing spk1
Ipaddressing spk1Ipaddressing spk1
Ipaddressing spk1
 
IP fundamentals
IP fundamentals IP fundamentals
IP fundamentals
 
Internet Protocol Address
Internet Protocol AddressInternet Protocol Address
Internet Protocol Address
 
Presentation 1 The Internet
Presentation 1 The InternetPresentation 1 The Internet
Presentation 1 The Internet
 
Chapter 7 exam
Chapter 7 examChapter 7 exam
Chapter 7 exam
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
 
Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...
Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...
Self assessment true-false Quiz: Chapter 4 - Computer Networking a top-down A...
 
Ccna1v3 mod10
Ccna1v3 mod10Ccna1v3 mod10
Ccna1v3 mod10
 
Report on routing interface configuration
Report on routing interface configurationReport on routing interface configuration
Report on routing interface configuration
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
Ip addressing upload
Ip addressing uploadIp addressing upload
Ip addressing upload
 
Chapter6
Chapter6Chapter6
Chapter6
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 

Similar to Lecture11

Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayNetwork Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayJill Crawford
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingKumar
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Agnieszka Kuba
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 

Similar to Lecture11 (20)

Mcse question
Mcse questionMcse question
Mcse question
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayNetwork Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) Essay
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Networking
NetworkingNetworking
Networking
 
Iap final
Iap finalIap final
Iap final
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshooting
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Ccnafile
CcnafileCcnafile
Ccnafile
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Firewall
FirewallFirewall
Firewall
 

More from Vedpal Yadav

Angela wellness diet
Angela wellness dietAngela wellness diet
Angela wellness dietVedpal Yadav
 
Chapter06 metabolism to be taught
Chapter06 metabolism to be taughtChapter06 metabolism to be taught
Chapter06 metabolism to be taughtVedpal Yadav
 
Biol221 24a energy currency to be taught
Biol221 24a energy currency to be taughtBiol221 24a energy currency to be taught
Biol221 24a energy currency to be taughtVedpal Yadav
 
Lecture31metabolism not required
Lecture31metabolism not requiredLecture31metabolism not required
Lecture31metabolism not requiredVedpal Yadav
 
Presentation on lipids in nutrition can be reffered
Presentation on lipids in nutrition can be refferedPresentation on lipids in nutrition can be reffered
Presentation on lipids in nutrition can be refferedVedpal Yadav
 
Nutritional biochemistry lecture 5 lipids cna be taught go~1
Nutritional biochemistry lecture 5 lipids cna be taught go~1Nutritional biochemistry lecture 5 lipids cna be taught go~1
Nutritional biochemistry lecture 5 lipids cna be taught go~1Vedpal Yadav
 
Lipids can be taught
Lipids can be taughtLipids can be taught
Lipids can be taughtVedpal Yadav
 
Lipid more than sufficient
Lipid more than sufficientLipid more than sufficient
Lipid more than sufficientVedpal Yadav
 
Lecture 15 lipids can be taught
Lecture 15 lipids can be taughtLecture 15 lipids can be taught
Lecture 15 lipids can be taughtVedpal Yadav
 
Lecture 13 fat for nutrition class
Lecture 13 fat for nutrition classLecture 13 fat for nutrition class
Lecture 13 fat for nutrition classVedpal Yadav
 
Ch. 5 fat types functions to be taught
Ch. 5  fat types functions to be taughtCh. 5  fat types functions to be taught
Ch. 5 fat types functions to be taughtVedpal Yadav
 
Sukalski lipids11complete with metabolism much detail
Sukalski lipids11complete with metabolism much detailSukalski lipids11complete with metabolism much detail
Sukalski lipids11complete with metabolism much detailVedpal Yadav
 
Biomolecules including structured notes to be taught earlier
Biomolecules including structured notes to be taught earlierBiomolecules including structured notes to be taught earlier
Biomolecules including structured notes to be taught earlierVedpal Yadav
 
Introduction to biology to be taught earlier
Introduction to biology to be taught earlierIntroduction to biology to be taught earlier
Introduction to biology to be taught earlierVedpal Yadav
 
Enzymes in detail can be taught a part of it
Enzymes in detail can be taught a part of itEnzymes in detail can be taught a part of it
Enzymes in detail can be taught a part of itVedpal Yadav
 
Ch12 enzymes can be taught
Ch12 enzymes can be taughtCh12 enzymes can be taught
Ch12 enzymes can be taughtVedpal Yadav
 
Lecture6 enzymes in much detail
Lecture6 enzymes in much detailLecture6 enzymes in much detail
Lecture6 enzymes in much detailVedpal Yadav
 
N323 nutriendeficiences
N323 nutriendeficiencesN323 nutriendeficiences
N323 nutriendeficiencesVedpal Yadav
 
Minerals1 complete to be taught
Minerals1 complete to be taughtMinerals1 complete to be taught
Minerals1 complete to be taughtVedpal Yadav
 
Lecture61 fat solublle vitamins can be taught
Lecture61 fat solublle vitamins can be taughtLecture61 fat solublle vitamins can be taught
Lecture61 fat solublle vitamins can be taughtVedpal Yadav
 

More from Vedpal Yadav (20)

Angela wellness diet
Angela wellness dietAngela wellness diet
Angela wellness diet
 
Chapter06 metabolism to be taught
Chapter06 metabolism to be taughtChapter06 metabolism to be taught
Chapter06 metabolism to be taught
 
Biol221 24a energy currency to be taught
Biol221 24a energy currency to be taughtBiol221 24a energy currency to be taught
Biol221 24a energy currency to be taught
 
Lecture31metabolism not required
Lecture31metabolism not requiredLecture31metabolism not required
Lecture31metabolism not required
 
Presentation on lipids in nutrition can be reffered
Presentation on lipids in nutrition can be refferedPresentation on lipids in nutrition can be reffered
Presentation on lipids in nutrition can be reffered
 
Nutritional biochemistry lecture 5 lipids cna be taught go~1
Nutritional biochemistry lecture 5 lipids cna be taught go~1Nutritional biochemistry lecture 5 lipids cna be taught go~1
Nutritional biochemistry lecture 5 lipids cna be taught go~1
 
Lipids can be taught
Lipids can be taughtLipids can be taught
Lipids can be taught
 
Lipid more than sufficient
Lipid more than sufficientLipid more than sufficient
Lipid more than sufficient
 
Lecture 15 lipids can be taught
Lecture 15 lipids can be taughtLecture 15 lipids can be taught
Lecture 15 lipids can be taught
 
Lecture 13 fat for nutrition class
Lecture 13 fat for nutrition classLecture 13 fat for nutrition class
Lecture 13 fat for nutrition class
 
Ch. 5 fat types functions to be taught
Ch. 5  fat types functions to be taughtCh. 5  fat types functions to be taught
Ch. 5 fat types functions to be taught
 
Sukalski lipids11complete with metabolism much detail
Sukalski lipids11complete with metabolism much detailSukalski lipids11complete with metabolism much detail
Sukalski lipids11complete with metabolism much detail
 
Biomolecules including structured notes to be taught earlier
Biomolecules including structured notes to be taught earlierBiomolecules including structured notes to be taught earlier
Biomolecules including structured notes to be taught earlier
 
Introduction to biology to be taught earlier
Introduction to biology to be taught earlierIntroduction to biology to be taught earlier
Introduction to biology to be taught earlier
 
Enzymes in detail can be taught a part of it
Enzymes in detail can be taught a part of itEnzymes in detail can be taught a part of it
Enzymes in detail can be taught a part of it
 
Ch12 enzymes can be taught
Ch12 enzymes can be taughtCh12 enzymes can be taught
Ch12 enzymes can be taught
 
Lecture6 enzymes in much detail
Lecture6 enzymes in much detailLecture6 enzymes in much detail
Lecture6 enzymes in much detail
 
N323 nutriendeficiences
N323 nutriendeficiencesN323 nutriendeficiences
N323 nutriendeficiences
 
Minerals1 complete to be taught
Minerals1 complete to be taughtMinerals1 complete to be taught
Minerals1 complete to be taught
 
Lecture61 fat solublle vitamins can be taught
Lecture61 fat solublle vitamins can be taughtLecture61 fat solublle vitamins can be taught
Lecture61 fat solublle vitamins can be taught
 

Lecture11

  • 2. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage of public IPv4 address So Private IP addresses can be used within a private network Three address ranges are reserved for private usage 10.0.0.0/8 172.16.0.0/16 to 172.31.0.0/16 192.168.0.0/24 to 192.168.255.0/24 A private IP is mapped to a Public IP, when the machine has to access the Internet Natting
  • 3. NAT NAT (Network Address Translation) Maps Private IPs to Public IPs It is required because of shortage of IPv4 Address Natting H1 H2 10.0.1.3 10.0.1.1 213.168.112.3 Private network 1 10.0.1.1 Router/NAT 10.0.1.2 H3 Router/NAT H4 10.0.1.2 10.0.1.3 Private network 2 H5 Internet 128.195.4.119 128.143.71.21
  • 4. NAT Static NAT : Maps unique Private IP to unique Public IP Dynamic NAT : Maps Multiple Private IP to a Pool of Public IPs (Port Address Translation : Maps a Public IP and Port Number to a service in Private IP) Natting H1 Source = 10.0.1.2 Source port = 2001 Private address: 10.0.1.2 Private network Source = 128.143.71.21 Source port = 3200 NAT H2 Private address: 10.0.1.3 Source = 10.0.1.3 Source port = 1090 Internet 128.143.71.21 Source = 128.143.71.21 Destination = 4444
  • 6. Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP: SNMP agents SNMP managers Management Information Bases (MIBs) SNMP protocol itself SNMP
  • 7. SNMP SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, called as MIB. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed. SNMP
  • 8. SNMP SNMP uses five basic messages (GET, GET-NEXT, GET-RESPONSE, SET, and TRAP) to communicate between the manager and the agent. The GET and GET-NEXT messages allow the manager to request information for a specific variable. The agent, upon receiving a GET or GET-NEXT message, will issue a GET-RESPONSE message to the manager with either the information requested or an error indication as to why the request cannot be processed. A SET message allows the manager to request a change be made to the value of a specific variable in the case of an alarm remote that will operate a relay. The agent will then respond with a GET-RESPONSE message indicating the change has been made or an error indication as to why the change cannot be made. The TRAP message allows the agent to spontaneously inform the manager of an ‘important’ event. SNMP
  • 10. VPN VPN is a private connection between two systems or networks over a shared or public network (typically Internet). VPN technology lets an organization securely extend its network services over the Internet to remote users, branch offices, and partner companies. In other words, VPN turns the Internet into a simulated private WAN. VPN is very appealing since the Internet has a global presence, and its use is now standard practice for most users and organizations. VPN
  • 12. How VPN Works To use the Internet as a private Wide Area Network, organizations may have to address two issues : First, networks often communicate using a variety of protocols, such as IPX and NetBEUI, but the Internet can only handle TCP/IP traffic. So VPN may need to provide a way to pass non-TCP/IP protocols from one network to another. Second data packets traveling the Internet are transported in clear text. Therefore, anyone who can see Internet traffic can also read the data contained in the packets. This is a problem if companies want to use the Internet to pass important, confidential business information. VPN
  • 13. How VPN Works VPN overcome these obstacles by using a strategy called Tunneling. Instead of packets crossing the Internet out in the open, data packets are fist encrypted for security, and then encapsulated in an IP packet by the VPN and tunneled through the Internet. The VPN tunnel initiator on the source network communicates with a VPN tunnel terminator on the destination network. The two agree upon an encryption scheme, and the tunnel initiator encrypts the packet for security. VPN
  • 14. Advantages of Using VPN VPN technology provides many benefits. Perhaps the biggest selling point for VPN is cost savings. One can avoid having to purchase expensive leased lines to branch offices or partner companies. On another cost-related note, you can evade having to invest in additional WAN equipment and instead leverage your existing Internet installation. Another benefit of VPN is that it is an ideal way to handle mobile users. VPN