How VPN Tunneling Works | Generic Example | Remote User VPN

Channel:
Subscribers:
6,570
Published on ● Video Link: https://www.youtube.com/watch?v=IiUx3DEF77o



Duration: 1:00
701 views
20


There are many "styles" of VPNs that exist, but the fundamentals of how everything works is basically the same. A VPN, or Virtual Private Network will essentially create an overlay network on top of an existing network fabric. Sometimes the existing network is the internet, but that's not always the case, it could also be a private network. MPLS, VPLS, VXLAN are a few examples of VPNs that don't necessarily use the internet as the underlay.

So how do VPNs actually work? Well, in most cases additional transport headers are added to all packets meant to traverse the VPN tunnel. This is why when a VPN is in use, it could also be referred to as "tunneling". The underlay is used for transport from one VPN endpoint to another. These additional transport headers and VPN endpoints are what creates the overlay network (the VPN). Each VPN endpoint is going to either encapsulate or de-encapsulate the packets depending on if the data is leaving or arriving at that endpoint.

Some VPNs will add an additional IP header, such as IPIP, GRE, IPSec, etc. Other times, a label or tag will be added... Think MPLS or DOT1Q. Anyway, there's quite a bit to familiarize yourself with here. Hopefully this quick video nails down the basics.

Did you find this content helpful? Let us know - https://www.rmtechcentral.com/contribute

Website: https://www.rmtechcentral.com
Contact: https://www.rmtechcentral.com/contact




Other Videos By Robert Mayer


2023-11-19The Magic John Screen Protector | iPhone 14 Pro Max #shorts #iphone #magicjohn #screenprotector
2023-11-19Is the MAGIC JOHN Screen Protector a SCAM or is it legit?? (Unboxing, Installation, and Review)
2023-05-22How Well Do You Understand Spanning Tree Protocol? Part 2 - Unmanaged Switch Loop + Managed Switch
2023-05-19Mini Data Center in a Loft?
2023-05-17Does Super Fast Internet Really Matter? Well... Sometimes...
2023-05-16How To Create Custom Ringtones for iPhone Using iTunes on a Windows PC | Full Video
2023-05-15How To Create Custom Ringtones for iPhone Using iTunes on a Windows PC
2023-05-10LSMC 11 Official Tutorial | A Paid Solution to Regain Access to a "Locked Out" Windows PC | RMTech
2023-04-14How Upload Bandwidth/Latency Can Affect Download Speed
2023-04-08Bits vs Bytes
2023-04-05How VPN Tunneling Works | Generic Example | Remote User VPN
2023-04-03Why Change the IP MTU on GRE Interfaces?
2023-04-01How Well Do You Understand Spanning Tree Protocol? Part 1 - Portfast to Portfast
2023-03-30No Firewall Rules for You!
2023-02-25Route Summarization and the Route to Null0
2023-02-18APC Smart UPS 2200VA (SUA2200RM2U) Battery Replacement
2022-12-122 Ways to Make Windows 11 Look and Feel More Like Windows 10
2022-07-19The Basics of a LAN and How Ethernet Switching Works
2022-03-26Routing Loops | Mutual Redistribution | Route Tagging | Cisco
2021-10-16IKEv2/IPSec Client to Site VPN Configuration | Cisco IOS | Cisco AnyConnect
2021-09-22Simple VPLS Configuration | LDP Signaling | Cisco | Service Provider



Tags:
networking
vpn
crypto
ssl
ike
ikev2
ssl vpn
tunneling
what is a vpn
how does a vpn work
packet encapsulation