Thursday, May 28, 2009

Server support

A VPN is a virtual private network that is used to connect the remote sites or remote users together using a public network (like, internet). VPN uses virtual connections to route traffic from the private network to the remote site. Following are the key benefits of using a VPN connection:

Users working at home can use the VPN connections to connect to their company's private network. Organizations can use VPN connection to establish connections with geographically separate offices using the public network like internet. Communication over VPN connection is more secure because VPN uses the following two protocols for data encryption:

Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (IPSec)

Basic informationof vpn

Vpn: The virtual private network technology included in Windows Server 2003 secure remote access to private networks. VPN allows administrators to take advantage of the Internet VPN is enabled using the Routing and Remote Access service. two main strategies that help provide secure connectivity between private networks and enabling network access for remote users, A dial-up or leased line connection creates a physical connection to a port on a remote access server on a private network. VPN connections use either Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol/Internet Protocol security (L2TP/IPSec) over an intermediate network, VPN saves the cost of long-distance phone service and hardware VPN solution includes advanced security technologies such as data encryption, authorization, and Network Access. administrators can connect remote or mobile workers (VPN clients) to private networks. VPN clients can use standard tools to access resources. some diffrence in VPN and remote. when we connect through VPn then we can't access another user data. but when we access through remotly then we can user data with our network.

VPN Connection authentication:
..............................
VPN technology provides a way of encapsulating private data with a header three types of authentication for VPN connections. VPN server authenticates the VPN client attempting the connection and verifies that the VPN client has the appropriate permissions VPN client also authenticates the VPN server. user attempting the PPTP or L2TP/IPSec connection is authenticated using Point-to-Point (PPP)-based user authentication protocols Microsoft Challenge-Handshake Authentication Protocol version 2 Shiva Password authentication with IPSec, L2TP/IPSec connections also verify that the remote access client computer Authentication Protocol. that time user connect his network send or recive data data send encripted form. because hacker can't easily read his data. that time data encrypted in algorithem language.

verify that the data being sent on an L2TP/IPSec VPN connection L2TP/IPSec packets include a cryptographic checksum based on an encryption key. encrypted for protection between the endpoints of the VPN connection. encryption should always be used for VPN connections where private data is sent the data. VPN client establishes a VPN connection, a virtual interface is created on the VPN client that represents the interface connected to the VPN server routing occurs between routers over either LAN-based shared access technologies. Any packet that is not intended for the neighboring LAN segment is sent to the remote network which ensures that any packets that are not addressed to the local LAN segment are sent to the remote network, VPN clients to route corporate-based traffic over the VPN connection while sending Internet-based traffic using the user’s local Internet connection. If a remote access client has reachability to both the Internet and a private organization network. two routing protocols that can be used in a site-to-site
1:Routing Information Protocol.
2:Open Shortest Path First .