SlideShare a Scribd company logo
www.netprotocolxpert.in
Layer 1 Overlay VPN
 we can use leased lines for connectivity between
branches. These are dedicated connections which
provide us a reliable link which is not shared with
anyone else. When data is being transmitted
between branches it is using a network path which
is not under our control. Now if there is a logical or
physical thing that provides security to our
communication, we refer to that as “VPN”. This is
the reason some people refer to T1, T3 or E1, E3
leased lines as layer 1 overlay VPN.
Layer 2 Overlay VPN
 When we want to connect our branches using a
multi-access network we use frame-relay. It is a
protocol standard, which provides us multi-access
network functionality as well as a secure
transmission channel. At this channel only we can
communicate with our branches not others i.e. why
we can also call it as Layer 2 Overlay VPN.
Layer 2 and half Overlay VPN
 MPLS (Multi-protocol Label Switching) is a very
widely used technology these days for multi-access
network. When a packet enters a MPLS network a
32 bits MPLS header tag is inserted between layer
2 & layer 3 headers. This is the reason why many
folks call MPLS a layer 2.5 technology thus making
it Layer 2 and Half Overlay VPN. When we use
MPLS our entire routing table is shared with service
provider and entire data travels in plain-text format,
to make it secure there is a special VPN called
GETVPN.
Layer 3 Overlay VPN
 Until now we have discussed about VPN which are not using
public network like internet. If we are using internet to
connect branches of organization then we need to make sure
the data transmitted should remain private and unaltered. To
secure communication we use IPSec (IP Security) which
encrypts the data to make it private and also ensures that it
is delivered unaltered.
 IPSec is not capable to exchange routing and multicast traffic
between branch routers. For this purpose GRE (Generic
Routing Encapsulation) is used. By default GRE has no
security mechanism to protect data. To obtain security for
routing and multicast traffic IPSec must be used along with
GRE.
 These Two Protocol IPSec & GRE are represented as a
Layer 3 Overlay VPN.
Layer 4 Overlay VPN
 Many times when we are using internet, we want the
communication between servers and clients to be
secure. For instance when using a bank website we
don’t want to transmit data like credit card information,
passwords, etc. in clear text. For this purpose Secure
Socket Layer (SSL) or Transport Layer Security (TLS)
was invented. SSL was developed initially and later
replaced by TLS. It is used for a wide variety of
applications like web browsing, VoIP, email, etc. It works
at transport layer along with other protocols and
encrypts the data before it is transmitted. This leads to it
being referred as layer 4 Overlay VPN
Layers
Overlay Virtual Private
Networks
Layer 1 Overlay T1, T3 & E1, E3
Layer 2 Overlay Frame-Relay, ATM
Layer 2 and half MPLS
Layer 3 Overlay IPSec, GRE
Layer 4 Overlay SSL/TLS (HTTPS)
Site-Site VPN
 Connectivity between branches is a necessity for
any organization. It enables the access of
resources at two branches from each other. Site-
Site VPN is used to secure this data transmission
between two sites. Thus all the devices in LAN of
one site can transmit data to devices in LAN of
other site. Things like employees placing VoIP calls
between two sites can be made possible if we have
VPN configured. It is one of the most commonly
deployed VPN.
Remote Access VPN
 Work from home is a very common thing in
organization these days. Employees can perform
their duties while they are at their home. The
biggest challenge for this is to get them connected
to organization network in a secure way. This
problem is solved by deployment of Remote Access
VPN.
Dynamic Multipoint Virtual Private Network (DM VPN)
 When we have multiple sites connected to each other via
internet and secure communication between them is required
Site-Site VPN can be used. The only problem is Site-Site
VPN in fully mesh connectivity is hard to create, maintain &
troubleshoot if the number of sites is huge. This problem is
solved by DMVPN (Dynamic Multipoint Virtual Private
Network). In DMVPN we create Hub & Spokes, where hubs
are called servers & spokes are called clients. When client
will boot up, it will register itself with the server. When one
spoke wants to communicate with other a dynamic tunnel is
created between two spokes automatically. After the
communication is done tunnel is destroyed. This solution is
more manageable and scalable.
Group Encrypted Transport Virtual Private
Network (GET VPN)
 All VPN solutions like Site-Site, Remote Access and
DMVPN provide point-point connectivity. GETVPN
is only the solution, which provides tunnel less any-
any connectivity. It makes the communication
secure in a private WAN deployments. GETVPN
was especially designed for secure data
communication over MPLS network.
Secure Socket Layer VPN (SSL VPN)
 SSL protocol was designed for secure data
communication between web server and web
browser. Later it was modified and renamed as
Transport Layer Security (TLS). The biggest benefit
of using SSL VPN is it does not necessarily require
installation of VPN client on the end user device.
SSL VPN can be used on any device that supports
web browsing, so end user device can be a PC,
Mac, Tablet or a Smartphone.
Protocols Virtual Private Network
IPSec (IP Security)
Site-Site, Remote Access,
DMVPN
GDOI (Group Domain of
Interpretation)
GET VPN (Group Encrypted
Transport VPN)
SSL ( Secure Socket Layer)
Three Modes (Clientless,
Thin, Thick)

More Related Content

PDF
MPLS Presentation
PPTX
Multiprotocol label switching (mpls) - Networkshop44
PPTX
Mqtt(Message queue telemetry protocol) presentation
PDF
21 Scheme_MODULE-2_CCN.pdf
PPTX
Congestion control and quality of services
PPTX
SNMP(Simple Network Management Protocol)
PPTX
What is Content centric networking
MPLS Presentation
Multiprotocol label switching (mpls) - Networkshop44
Mqtt(Message queue telemetry protocol) presentation
21 Scheme_MODULE-2_CCN.pdf
Congestion control and quality of services
SNMP(Simple Network Management Protocol)
What is Content centric networking

What's hot (20)

PPTX
ISSUES IN AD HOC WIRELESS NETWORKS
PPT
Congetion Control.pptx
PPTX
A comparative study of reactive and proactive routing
PPTX
Multiprotocol label switching
PPTX
Password Storage Explained
PPT
Vpn presentation
PPSX
Mobile ip overview
PDF
Wan configuration in packet tracer by Tanjilur Rahman
PPT
Tcp Udp Icmp And The Transport Layer
PPTX
Csma protocols
PPTX
IPV6 Header format.pptx
PPTX
User datagram protocol (udp)
PPTX
Mpls technology
PPT
Virtual Private Network (VPN).
PPTX
Seminar gprs
PPTX
Introduction to data link layer
PPTX
Load balancing
PDF
CS8591 Computer Networks - Unit II
PDF
PDF
BGP Techniques for Network Operators
ISSUES IN AD HOC WIRELESS NETWORKS
Congetion Control.pptx
A comparative study of reactive and proactive routing
Multiprotocol label switching
Password Storage Explained
Vpn presentation
Mobile ip overview
Wan configuration in packet tracer by Tanjilur Rahman
Tcp Udp Icmp And The Transport Layer
Csma protocols
IPV6 Header format.pptx
User datagram protocol (udp)
Mpls technology
Virtual Private Network (VPN).
Seminar gprs
Introduction to data link layer
Load balancing
CS8591 Computer Networks - Unit II
BGP Techniques for Network Operators
Ad

Viewers also liked (20)

PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
PPTX
Comparison between traditional vpn and mpls vpn
PPTX
Design And Analysis Of MPLS based VPN
PDF
Doc6 mpls vpn-ppt
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PDF
Attack modeling vs threat modelling
PPT
Unauthorized access, Men in the Middle (MITM)
PPT
Virtual Private Network
PPTX
Cisco's Three-tier Hierarchical Network Model
PPTX
Lan internetworking devices
PPT
Lec 1 and 2 evolution
PPT
Troubleshooting basic networks
PPTX
Vulnerability Assessment
PPTX
ASA Firewall Interview- Questions & Answers
PDF
PPTX
Network sniffers & injection tools
PPT
Computer Networking: Subnetting and IP Addressing
PDF
The evolution of mobile technologies 1 g to 4g to lte
VPN, Its Types,VPN Protocols,Configuration and Benefits
Comparison between traditional vpn and mpls vpn
Design And Analysis Of MPLS based VPN
Doc6 mpls vpn-ppt
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Attack modeling vs threat modelling
Unauthorized access, Men in the Middle (MITM)
Virtual Private Network
Cisco's Three-tier Hierarchical Network Model
Lan internetworking devices
Lec 1 and 2 evolution
Troubleshooting basic networks
Vulnerability Assessment
ASA Firewall Interview- Questions & Answers
Network sniffers & injection tools
Computer Networking: Subnetting and IP Addressing
The evolution of mobile technologies 1 g to 4g to lte
Ad

Similar to Types of VPN (20)

PPT
V P N
PDF
VPN (virtual private network)
PPTX
VPN & FIREWALL
PPTX
WLAN:VPN Security
PDF
Virtual private networks
DOCX
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
PPTX
Introduction to firewalls and virtual private networks
PPT
Vpn_NJ ppt
PPTX
Virtual Private Network
PDF
PPTX
What is VPN?
PPTX
Virtual Private Network
PDF
VPN - Virtual Private Network
PDF
28 11 sep17 14aug 8386 9970-1-ed(edit)
PDF
28 11 sep17 14aug 8386 9970-1-ed(edit)
PDF
IPsec vpn topology over GRE tunnels
PPT
Virtual private networks by darshana viduranga
PDF
IRJET- A Survey of Working on Virtual Private Networks
V P N
VPN (virtual private network)
VPN & FIREWALL
WLAN:VPN Security
Virtual private networks
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Introduction to firewalls and virtual private networks
Vpn_NJ ppt
Virtual Private Network
What is VPN?
Virtual Private Network
VPN - Virtual Private Network
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
IPsec vpn topology over GRE tunnels
Virtual private networks by darshana viduranga
IRJET- A Survey of Working on Virtual Private Networks

More from NetProtocol Xpert (20)

PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPTX
MPLS Layer 3 VPN
PPTX
Common Layer 2 Threats, Attacks & Mitigation
PPTX
Storm-Control
PPTX
Dynamic ARP Inspection (DAI)
PPTX
IP Source Guard
PPTX
DHCP Snooping
PPTX
Password Recovery
PPTX
Application & Data Center
PPTX
Cisco ISR 4351 Router
PPTX
Cisco ASR 1001-X Router
PPTX
Securing management, control & data plane
PPTX
Point to-point protocol (ppp), PAP & CHAP
PPTX
Avoid DNS lookup when mistyping a command
PPTX
TCLSH and Macro Ping Test on Cisco Routers and Switches
PPTX
Private VLANs
PPTX
MTU (maximum transmission unit) & MRU (maximum receive unit)
PPTX
OTV Configuration
PPTX
Cisco OTV 
PPTX
OTV(Overlay Transport Virtualization)
Basic Cisco ASA 5506-x Configuration (Firepower)
MPLS Layer 3 VPN
Common Layer 2 Threats, Attacks & Mitigation
Storm-Control
Dynamic ARP Inspection (DAI)
IP Source Guard
DHCP Snooping
Password Recovery
Application & Data Center
Cisco ISR 4351 Router
Cisco ASR 1001-X Router
Securing management, control & data plane
Point to-point protocol (ppp), PAP & CHAP
Avoid DNS lookup when mistyping a command
TCLSH and Macro Ping Test on Cisco Routers and Switches
Private VLANs
MTU (maximum transmission unit) & MRU (maximum receive unit)
OTV Configuration
Cisco OTV 
OTV(Overlay Transport Virtualization)

Recently uploaded (20)

PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Sustainable Sites - Green Building Construction
PDF
PPT on Performance Review to get promotions
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
573137875-Attendance-Management-System-original
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Welding lecture in detail for understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
OOP with Java - Java Introduction (Basics)
Sustainable Sites - Green Building Construction
PPT on Performance Review to get promotions
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Operating System & Kernel Study Guide-1 - converted.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Welding lecture in detail for understanding
CYBER-CRIMES AND SECURITY A guide to understanding

Types of VPN

  • 2. Layer 1 Overlay VPN  we can use leased lines for connectivity between branches. These are dedicated connections which provide us a reliable link which is not shared with anyone else. When data is being transmitted between branches it is using a network path which is not under our control. Now if there is a logical or physical thing that provides security to our communication, we refer to that as “VPN”. This is the reason some people refer to T1, T3 or E1, E3 leased lines as layer 1 overlay VPN.
  • 3. Layer 2 Overlay VPN  When we want to connect our branches using a multi-access network we use frame-relay. It is a protocol standard, which provides us multi-access network functionality as well as a secure transmission channel. At this channel only we can communicate with our branches not others i.e. why we can also call it as Layer 2 Overlay VPN.
  • 4. Layer 2 and half Overlay VPN  MPLS (Multi-protocol Label Switching) is a very widely used technology these days for multi-access network. When a packet enters a MPLS network a 32 bits MPLS header tag is inserted between layer 2 & layer 3 headers. This is the reason why many folks call MPLS a layer 2.5 technology thus making it Layer 2 and Half Overlay VPN. When we use MPLS our entire routing table is shared with service provider and entire data travels in plain-text format, to make it secure there is a special VPN called GETVPN.
  • 5. Layer 3 Overlay VPN  Until now we have discussed about VPN which are not using public network like internet. If we are using internet to connect branches of organization then we need to make sure the data transmitted should remain private and unaltered. To secure communication we use IPSec (IP Security) which encrypts the data to make it private and also ensures that it is delivered unaltered.  IPSec is not capable to exchange routing and multicast traffic between branch routers. For this purpose GRE (Generic Routing Encapsulation) is used. By default GRE has no security mechanism to protect data. To obtain security for routing and multicast traffic IPSec must be used along with GRE.  These Two Protocol IPSec & GRE are represented as a Layer 3 Overlay VPN.
  • 6. Layer 4 Overlay VPN  Many times when we are using internet, we want the communication between servers and clients to be secure. For instance when using a bank website we don’t want to transmit data like credit card information, passwords, etc. in clear text. For this purpose Secure Socket Layer (SSL) or Transport Layer Security (TLS) was invented. SSL was developed initially and later replaced by TLS. It is used for a wide variety of applications like web browsing, VoIP, email, etc. It works at transport layer along with other protocols and encrypts the data before it is transmitted. This leads to it being referred as layer 4 Overlay VPN
  • 7. Layers Overlay Virtual Private Networks Layer 1 Overlay T1, T3 & E1, E3 Layer 2 Overlay Frame-Relay, ATM Layer 2 and half MPLS Layer 3 Overlay IPSec, GRE Layer 4 Overlay SSL/TLS (HTTPS)
  • 8. Site-Site VPN  Connectivity between branches is a necessity for any organization. It enables the access of resources at two branches from each other. Site- Site VPN is used to secure this data transmission between two sites. Thus all the devices in LAN of one site can transmit data to devices in LAN of other site. Things like employees placing VoIP calls between two sites can be made possible if we have VPN configured. It is one of the most commonly deployed VPN.
  • 9. Remote Access VPN  Work from home is a very common thing in organization these days. Employees can perform their duties while they are at their home. The biggest challenge for this is to get them connected to organization network in a secure way. This problem is solved by deployment of Remote Access VPN.
  • 10. Dynamic Multipoint Virtual Private Network (DM VPN)  When we have multiple sites connected to each other via internet and secure communication between them is required Site-Site VPN can be used. The only problem is Site-Site VPN in fully mesh connectivity is hard to create, maintain & troubleshoot if the number of sites is huge. This problem is solved by DMVPN (Dynamic Multipoint Virtual Private Network). In DMVPN we create Hub & Spokes, where hubs are called servers & spokes are called clients. When client will boot up, it will register itself with the server. When one spoke wants to communicate with other a dynamic tunnel is created between two spokes automatically. After the communication is done tunnel is destroyed. This solution is more manageable and scalable.
  • 11. Group Encrypted Transport Virtual Private Network (GET VPN)  All VPN solutions like Site-Site, Remote Access and DMVPN provide point-point connectivity. GETVPN is only the solution, which provides tunnel less any- any connectivity. It makes the communication secure in a private WAN deployments. GETVPN was especially designed for secure data communication over MPLS network.
  • 12. Secure Socket Layer VPN (SSL VPN)  SSL protocol was designed for secure data communication between web server and web browser. Later it was modified and renamed as Transport Layer Security (TLS). The biggest benefit of using SSL VPN is it does not necessarily require installation of VPN client on the end user device. SSL VPN can be used on any device that supports web browsing, so end user device can be a PC, Mac, Tablet or a Smartphone.
  • 13. Protocols Virtual Private Network IPSec (IP Security) Site-Site, Remote Access, DMVPN GDOI (Group Domain of Interpretation) GET VPN (Group Encrypted Transport VPN) SSL ( Secure Socket Layer) Three Modes (Clientless, Thin, Thick)