Virtual Private Network - Video By Sikandar Shaik || Dual CCIE (RS/SP) # 35012

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] now let's talk about other other mind technologies apart from the previous one which we discussed these lines frame delay we discussed and also we discuss some Metro Ethernet LAN connections in the previous videos and also we have seen some MPLS introduction as well now the other most common kind of LAN connection which you will find is Virtual Private Networks now this Virtual Private Networks or the other kind of networks which can be used now the good thing about this is we are going to build our own wired connection so let us take an example how VPN is going to work Virtual Private Network now in this what we are doing is let's say I go to a branch office in Hyderabad and I got an understand office in in some different location maybe in Dubai or in Bangalore like that now I want to build a bad connection and I'm going to run a small branch office and and I cannot go with a leased lines or or any line which is given by this or this corner now using these VPNs what I can do is I can build my own one connection over the existing Internet which is already there now it can be internet or it can be MPLS or it can be any kind of other band connections you can use but majorly we we can still use internet and every organization connects to Internet so probably we we do connect to internet but now the question is how we are going to build a band connection from Hyderabad to Dubai location now for that we need to have some registered public IP addresses from both the sides so we are going to use some registered public IP so it can be anything based on the region wise so because in order to build a logical point-to-point logical VPN network between these two you have you need some identification and probably the public IP is a globally unique IDs which identify your Virtual Private Network and we can have virtually a separate connection which is build and this is what we call as virtual private networks building a virtual private network over the existing public infrastructures on the public network which is already there now this is one one more common popular kind of technology in today's vehicles again we use the major reason is it is little bit much cost effective when compared with any of the other kind of LAN connections but again it's something we need to build on overall so we are just taking a band connection which is some public IP is on both the sides and you can build your own van connection over it now we can build multiple answers like you can have some one more VPN from this way to this way we can have one more something like that now there are some technologies which works based on this kind of implementations like there is something called generic routing encapsulation GRE kind of VPNs which you will be having some in comes security kind of implementations we have something called dynamic multi-point VPNs they all works in this in this format and then but the major drawback with these two is there is no encryption or there is no security over for your data so because the Virtual Private Networks is built over the existing Internet so probably there is no security here so which means it's not going to encrypt the information so if you are sending your information over this there is no guarantee that your data is secure so that is the one of the major drawback with this one now GRE are typically point-to-point connection we can have just one to one connection but whereas dmvpn supports point to multi-point connections just like we do in the frame village we can have point to multi-point connections it's like you know multi-point GRE or an extension to the GRE implementations now we can we can still have other kind of VPN we can build something called IPSec VPNs now which is going to provide the same thing we can build a logical point-to-point again it is a point-to-point connection in IPSec VPN it works based on point-to-point again now the major enhancement in the IPSec VPN is Internet Protocol security which is going to provide some strong encryption algorithms it's going to ensure that your data is secure i cuted some slang strong encryption algorithms which which provides from data of data integrity I think it is something ensuring that no one modifies the data data confidential so that's something called data confidentiality and by using some strong encryption algorithms it provides that your data is confidential no one can read that information by using some strong encryption algorithm and also it provides something called data integrity where it will ensure that no one modify the information so it users come strong hashing algorithms where you send the information if someone modifies it will identify the hashing ilysm on the opposite side and if that does not match if someone modifies it will not match so it will automatically drop it provides data integrity as well as it does we provide some authentication methods ways you can identify the remote piece by using some passwords we can configure some kind of passwords on both the sides which will ensure that if the password matches on both the sides then only is going to establish the PPS now these are the three different kinds of implementations which can be used included networks now introduced intervals we we don't use GRS or something not much use in Buddhist networks and VPN IPSec VPN they just provide only virtual point-to-point connections probably most commonly included network we use something called dmvpn and over that we can build IPSec as well because dmvpn the major advantage is we can have point to multi-point connections dynamic multi-point informations that something very good but there is no security so to provide the security we can still have IP 6 implemented over dmvpn now is something what you will see more in detail on when you go with some CCNA security CCNP security kind of stuff or if you are going with some CCI is out increasing kind of topics in the new version it also cover size but in christian area we just provide some introduction on this technologies now these all come under this category and then we have two types of regions again in fact we have many types of VPNs like when you get if you get into some advanced topics a side-to-side weapon is a place where we are connecting our prime surfaces to the head office or from Rancho Vista branch office over Internet and there is a virtual connection we paint and established within that well as in case of remote access VPN we are going to provide the remote users maybe is sitting in a conference center or maybe sitting out off station is sitting in some hotel room or maybe he is moving around and but he is connecting to internet and from the internet he can connect to the VPN server some device over this which will attenti gate this user and you can access the resources in the land as it is sitting in the last yr remotely and this user is going to install some weekend client software and it can access the resources as if he is sitting in the lab that's what we call as a remote access VPN wave the users will get an access to the remote user networks by sitting anyways probably sitting in the home you can access the differences now these are two typical a kind of details which we use and to provide security VPNs uses some IPSec protocols which provides from data confidentiality data integrity as well as it provides some authentication of the source [Music]
Info
Channel: Sikandar Shaik
Views: 82,838
Rating: 4.8653464 out of 5
Keywords: ccna, wan, vpn, ccna vpn
Id: kgCi1AIRzok
Channel Id: undefined
Length: 8min 13sec (493 seconds)
Published: Fri Jan 20 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.