Is VPN all about encapsulating the source and destination IP address?

  • Context: Comp Sci 
  • Thread starter Thread starter shivajikobardan
  • Start date Start date
  • Tags Tags
    Source
Click For Summary
SUMMARY

The discussion centers on the functionality of Virtual Private Networks (VPNs) and their encryption capabilities. Participants question whether VPNs solely encapsulate and encrypt source and destination IP addresses, as well as the payload. The conversation highlights the need for clarity on the intricacies of VPN operations, particularly regarding the necessity of firewall addresses in the context of encryption. References to foundational texts, such as "Cryptography and Network Security" by Atul Kahate, are suggested for further understanding.

PREREQUISITES
  • Understanding of VPN technology and its encryption methods
  • Familiarity with IP addressing and encapsulation techniques
  • Knowledge of firewall functionalities and their role in network security
  • Basic concepts of cryptography as applied to network security
NEXT STEPS
  • Research the encryption methods used in VPNs, focusing on protocols like OpenVPN and IPSec
  • Learn about the role of firewalls in conjunction with VPNs and how they interact
  • Explore the differences between VPNs and traditional firewalls
  • Study the content of "Cryptography and Network Security" by Atul Kahate for deeper insights into network security
USEFUL FOR

This discussion is beneficial for network engineers, cybersecurity professionals, and anyone seeking to understand the complexities of VPN technology and its encryption mechanisms.

shivajikobardan
Messages
637
Reaction score
54
Homework Statement
VPN-Virtual Private Network
Relevant Equations
None
What’s encrypted here? Is the source and destination IP address encrypted? Is the firewall1 address and firewall2 address encrypted? Is the payload also encrypted?
Is this all what a VPN does? I can’t really believe that VPN only encapsulates and encrypts.
If it’s encrypting the source and destination IP address, is encapsulating with firewall address necessary? Because nobody is going to find about that.
8tg06U0PsMstGcsScoIgdr9eFbpp3-LOSTyMtyRDd-zMiUQPiw.png

FHDl4y-ktRMVGP6ZXrnIysXYfyIeZ8Oa8BC2-ityIxrou75x4g.png

hql9pFIt1liByaB39skq4PnOqxkGkApJ31q0E2l85trGZnJS6g.png

GZ5QGOg5gUHpyXBlAmRWretxfHFHI6ZUBfP4fHfqq9S2HIhb-w.png

I feel I'm missing some crucial information about the intricacy of VPN working. So, please guide.
 
Physics news on Phys.org
Where did you get those copyrighted diagrams? Do you own their copyright?

And you know that you need to post valid references and ask *specific* questions about those references. Start here for a basic intro:

https://en.wikipedia.org/wiki/Virtual_private_network
 
  • Like
Likes   Reactions: shivajikobardan
It's from the book "Cryptography and Network Security " by "Atul Kahate". I still don't get how is this about VPN? This looks about Firewalls.
 

Similar threads

  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 1 ·
Replies
1
Views
1K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 4 ·
Replies
4
Views
4K
Replies
3
Views
3K
  • · Replies 12 ·
Replies
12
Views
3K
  • · Replies 13 ·
Replies
13
Views
4K
  • · Replies 4 ·
Replies
4
Views
2K
  • · Replies 16 ·
Replies
16
Views
2K
  • · Replies 10 ·
Replies
10
Views
4K