Time
31 hours 29 minutes
Difficulty
Beginner
CEU/CPE
30

Video Description

Tunneling and Encryption This lesson covers methods of tunneling and encryption as a means of network control. The main concept with tunneling and encryption is the Virtual Private Network (VPN). A VPN is an encrypted private tunnel over a public network. Basically, it's a means of creating a private network on a public interface.

Video Transcription

00:04
our next type of network access control that we're gonna talk about is tunneling and encryption.
00:08
So what is tunneling an encryption?
00:10
No.
00:12
When we need to make a connection between two in points over a public network, we need to have some way that we can transmit that information that we can access that network without disclosing the information that we're transmitting to the public.
00:28
A lot of times, this is by piggybacking on a public Internet connection and then just using a VPN tunnel through the Internet connection. That way we can essentially, we can authenticate ourselves, and we can send information encrypted
00:45
without having to actually be in the office or
00:49
Lisa dedicated line. We could just use the standard Internet connection. So let's let's take a look at this a little bit closer. Our main concept with our tunnelling encryption, tunneling and encryption, is going to be a V p. M. Now VP and stands for a virtual private network and essentially, what a VPN is. It's an encrypted
01:07
private tunnel over and over a standard public network,
01:11
so we're essentially
01:14
creating a private network on a public interface. So that's a lot of words that if we don't really understand what what's going on, make no sense. So let's take a look at this in practice. Let's say that you work. You work from home. Sometimes you have two days out of the week that where you
01:34
get to work from home,
01:34
you have to look, but you have to log in. You have to be self to do work.
01:38
You also have the flexibility to work from from the road. If you go on your business trips. So you go on a business business trip and you're sitting in the hotel where you're working and the hotel has available WiFi.
01:53
So you pull out here, you pull out your company laptop, you open it up and you remember that before this big presentation, you need to access a file that's on the file server at your company.
02:02
So your company has the VP and set up a virtual private network which allows you to connect from from wherever you are in the world, over the Internet, to the company. Sever, while depending on the company, some companies little sidebar. Some companies may not permit you to connect through your VP in when you're in other countries
02:23
because those other countries may act, their government may actually be
02:27
tracking, and they may be putting additional tracking code into the data that you're transmitting when it's going through their their country's Internet service providers. So you need to check your company's policies for this, of course, as to where you're allowed to connect from through V. P. M. But anyway, back to our main discussion.
02:44
You're sitting in a hotel in Oregon
02:46
and you're about to go on and you're about to have a presentation, and your company's main offices are in Washington, D. C. So you need to retrieve this file from the server in Washington, D. C. But it's sensitive company information. It's need to know confidential, sensitive company information.
03:05
So you don't want all the other people on this
03:08
put on this public this public hotel wireless to be able to see this data coming down. Maybe it's ah, big conference, and there are multiple other companies that are also staying in this hotel that could potentially be listening into the wireless to sniff for any traffic or anything that they're competition's doing to get in, get a leg up.
03:29
So
03:30
this is of course, the ultimate.
03:31
I need to make sure your data is secure. One of the ultimate need to make sure your company's data secure scenario.
03:38
So you're on a public open wireless connection in the hotel.
03:44
Now we're going to think of
03:46
the connection
03:47
from you to the Internet as a tunnel
03:52
and
03:54
because we're on a public, open wireless,
04:00
this wireless inner This wireless access point is just sending out a big tunnel
04:04
that anyone connected to that wireless access point can listen to the traffic that's going on in that tunnel right now in that hotel.
04:13
So you have another companies
04:15
employee who's connected to the tunnel,
04:17
and you're also connected to the Internet tunnel
04:21
now,
04:23
rather than just connecting to the Internet tunnel connecting to the wireless access point, going to the Internet, going to your company's accent remote, remote access server and then connecting to the file server.
04:36
What you're going to do is you're going to start up
04:40
your remote access VPN.
04:43
So what this means is, before you actually can get to this server to pull your files, you're going to initiate your VP in. You're going to initiate an encrypted tunnel connection
04:54
by first sending an authentication method, you're gonna send an authentication over the Internet,
05:01
and this is going to be encrypted authentication.
05:04
And that's going to go to whichever aspect of your company is authenticating your remote dialling connection.
05:13
So
05:14
this device,
05:16
well, now authenticate you.
05:18
Whichever meet by whatever means it does. We'll talk about those means later.
05:23
So this device authenticates you
05:25
and it says, Okay, your authenticated. You're allowed to connect to the VPN,
05:30
so it's going to send back information
05:35
and you're going toe it, negotiate a tunnel.
05:40
So now
05:43
that you've been authenticated, you're gonna negotiate a tunnel.
05:46
What you're essentially doing
05:48
is you're creating your own private encrypted tunnel
05:55
inside of the existing
05:58
Internet public Internet tunnel
06:00
to the Internet,
06:02
over the Internet
06:05
and over to your company.
06:10
So the other person who's sitting on the same public wireless connection is you, even if they listen in and even if they're listening to the packets that you're sending
06:19
as soon as you've initiated your VP in connection and a CZ, long as you have this VP in connection set up correctly, all they see is encrypted data, so they don't see any of the connections that you're initiating back and forth. They don't see any of your data.
06:35
Once that encrypted tunnel gets to your in point, however,
06:39
it becomes unencrypted again because now it's in a safe location.
06:44
It goes to your file server. It says, Hey, can you send me this file? Any for the conference file server says. Sure,
06:49
in computer language
06:51
sends the file back,
06:54
and then once it hits this point, it gets re encrypted and then goes over the Internet through your encrypted tunnel.
07:01
Now, in the days before we could do this in this days before VPN in orderto have in order to be sure that you had a secure connection, you would either have to be sitting in the office or you would have to have a essentially a dedicated line running from you to your office. That was the only way you could verify
07:19
that no one else was listening in on your connection
07:23
with VP ends. We can now you lot utilize the existing Internet, utilize the existing wires that connect practically all most toe all businesses now, and just essentially create our own piggyback connection over that That's encrypted,
07:39
so
07:40
this allows us a lot more. It makes it makes remote connections in tow work. Ah, lot more secure. It makes them a lot more user friendly. And it prevents us from having to have millions of wires connecting all the businesses across the United States because we now have essentially what is a dedicated what is says,
08:00
essentially a virtually a virtual
08:03
dedicated private network from us to our office. So that's why the peons are so powerful. And that's why the peons are so important in our work environment.
08:13
So
08:16
with our VP ins, we have two main types of the peons that we're goingto need to discuss. RV peons can be site to site
08:24
or client to site.
08:28
Now we're gonna talk about clients a site first, because that's what we have right here already set up
08:33
clients. A site, VPN, is a remote access VPN from a user back into their remote network,
08:41
so it's essentially a connection from you to work or you back to your home network. Whatever the case may be, that is a client to cite VP in connection. This may just be a There may already be a built in operating system functionality where you can set up your VP in
08:58
or you may have your company may issue specialized software to be downloaded on the laptop
09:03
so that you can set up your VP in. But whatever the case may be, remember that client to site is a connection from you back to your home or office.
09:11
Um,
09:13
now we say home or office, because you can Also VPN aren't just limited to all office functions. You can also utilize V peons in order just to make sure that your own communications air secure when you're out in public.
09:26
If you If you purchase of VPN now, you can actually go online and purchase. VP is to secure servers or you set up a VPN in your home. You can actually, just simply when you're out and about your out in a coffee shop, you can connect through a VPN back to your home and then from your home network, essentially go out to the Internet
09:46
to make sure that no one else in that coffee shop is listening in to your Internet connection. So VPN aren't just for connecting back to work. VP ends are very useful, even just for making sure that all of your Internet traffic is secure,
09:58
or at least it's not being listened to
10:01
on the network that you're currently on.
10:05
So that's client to site.
10:07
Next, we have sight to sight now. Site decided a little bit different site. The site isn't connecting a single computer to back toe work. Site to site is connecting to business sites together or two,
10:20
essentially two different networks together over a public network.
10:24
So rather than you in a hotel connecting back to
10:28
work, it may be your headquarters in a branch office in this branch office has several users in it, and these users need to connect back to the servers that are in the head office. They need to connect back to that data. Maybe there's some replication going on between the file servers and the file servers need to connect back
10:48
to the head office.
10:50
Whatever the case may be, you need a connection
10:54
from the branch office to the head office so that it's like the people in the branch office are sitting at computers in the head office.
11:01
So the people in the branch office will all connect to their network connection with all connect to their switch to the router and then this device. They'll have a VPN device,
11:13
which will then initiate a VP and tunnel
11:18
over to the head office using the pre existing Internet connection. This is essentially like a dedicated least line, but it's a lot cheaper. You're you're not paying for an entire line to be dug from you to your in point. You're not paying for a you're not paying for a dedicated,
11:37
a dedicated least line, which can cost a lot of money from one your branch office tear main headquarters. These dedicated least lines can be You could replace that with this alternative VP in structure, which is essentially a dedicated least line through the Internet that is a lot cheaper, a virtual dedicated least line
11:58
through just a standard Internet
12:00
because you don't want other people listening in on this connection between these two businesses. You want to make sure that it's encrypted, that it's secure and that it is a point to point connective ity, and that's what you're getting. That's what you're getting with this. With this VP in connection, it's avert essentially that virtual private network.
12:18
No.
12:18
Well, why you may ask Why don't you just transmit data encrypted over just over the Internet? Why do you need it to actually be tunneled? Why do you need a virtual private network tunnel? While a virtual private network tunnel allows us to not only transmit data on Layer three, which is the I P layer, but it also allows us to transmit layer to data.
12:39
So if remember, Layer are Leia to data is going to be
12:41
data that packets that are being sent, like at the Mac address level at the network interface card level. They're not. They're dated. It's dated that may not be pushed out that may not be broadcast out of replicated out by a router, but because we haven't VP and concentrator, or we have some sort of VP and set of going on
13:01
rvp and will actually allow
13:03
layer to traffic to go from one point to the other over the Internet So VPN it's a encrypted virtual tunnel between Point A and point B that not only helps us by providing tunneling and encryption, but it also helps us by allowing us to
13:22
Sinden receive layer to traffic
13:24
through the Internet, which is which would otherwise typically just be a layer three connectivity so we could do things like an already P session from one computer in the branch office to a computer in the headquarters office. So it's important to realize that we do have that ability to have that layer to connective ity
13:43
using that v p m.
13:46
So
13:46
sight to sight it connects our 22 sites or two. Business is cheaper than a standard dedicated least line, and we can set it up to be persistent or dial on command. Persistent would be a dedicated least line are
14:00
my apologies Persistent would be a VPN that is connected and is essentially always on always on VP in connection. Doesn't matter if data's being transmitted over that VP in or not, it's still set up. We still have that encrypted tunnel between the Point A and point B,
14:16
whereas a dialogue on command is that VP and tunnel on Lee comes alive when it's needed,
14:22
and then for a short time frame. After that and then after it hasn't had data transmitted over a certain amount of time. It just stops and disconnects. So depending on our network, you utilization our network bandwidth and how often we need our band. R R v p n. We may want to consider whether we're using are persistent
14:41
or a dial on demand
14:43
v P M. If we're using a site to site set up.

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Systems Analyst and Administrator at SAIC
Instructor