VPN
VPN
my isp would see my activities and the us government and hackers if they
wanted to they can also be able to see my online activities.
With the vpn service it would be a different story. Vpn software or the
vpn client creates a tunnel to my vpn server before i send and receive
any data. My isp only knows my connection to the vpn server but has no
idea what's going on after that. This means that if i surf online with a vpn,
the vpn server becomes the source of my data. The vpn server is like
middleman or proxy it disguises my ip address and hides my location. All
my traffic data are transmitted through the encrypted tunnel, my isp and
other third parties cannot see which websites i visit or what data i send or
receive online
For the same reason this type of vpn allows users to access regionally
restricted content from anywhere in the world it can be used to bypass
the firewalls and internet censorship to gain access to the entire internet
The VPN tunnel between the VPN client and VPN server passes through
the ISP, but since all the data is encrypted, the ISP cannot see the user’s
activity. The VPN server’s communications with the Internet are
unencrypted, but the web servers will only log the IP address of the VPN
server, which gives them no information about the user.
*The VPN client is the VPN software installed on the user’s device.
What is IPsec?
IPsec helps keep private data secure when it is transmitted over a public
network. More specifically, IPsec is a group of protocols that are used
together to set up secure connections between devices at layer 3 of
the OSI model (the network layer). IPsec accomplishes this by scrambling
all messages so that only authorized parties can understand them — a
process known as encryption. IPsec is often used to set up virtual private
networks (VPNs).
What is SSL/TLS?
Secure Sockets Layer (SSL) is a protocol for encrypting HTTP traffic, such
as connections between user devices and web servers. Websites that use
SSL encryption have https:// in their URLs instead of http://. SSL was
replaced several years ago by Transport Layer Security (TLS), but the
term "SSL" is still in common use for referring to the protocol.
SSL (secure socket layer) VPNs leverage the SSL protocol initially designed
for secure web transactions. They enable remote users to connect
securely to network resources, often through a web browser. SSL is a
favorite for scenarios where users require on-the-go access without
extensive client software installations.
Operating at the application layer, SSL VPNs don't encapsulate the entire
packet like IPsec VPNs do. Instead, they only encapsulate the payload—
the actual data you are sending or receiving. This allows them to provide
more granular, application-specific access.
Ease of use and deployment: Without the need for specialized client
software and the ability to work directly through standard web
browsers, SSL VPNs offer a simplified setup process. IT teams
appreciate the reduced technical overhead, and end users enjoy a
relatively seamless connection experience, eliminating many
common barriers to remote work.
One of the major differences between SSL and IPsec is which layer of the
OSI model each one belongs to. The OSI model is an abstract
representation, broken into "layers," of the processes that make the
Internet work.
The IPsec protocol suite operates at the network layer of the OSI model. It
runs directly on top of IP (the Internet Protocol), which is responsible for
routing data packets.
Implementation
In contrast, all web browsers already support SSL (whereas most devices
are not automatically configured to support IPsec VPNs). Users can
connect to SSL VPNs through their browser instead of through a dedicated
VPN software application, without much additional support from an IT
team. (However, this means that non-browser Internet activity is not
protected by the VPN.)
these two technologies are the common use technology for establishing
secure
communication between remote devices and private Network although
they both serve
purpose of the secure communication they have some fundamental
differences
Now, to allow the data transfer to happen, there are two methods that we
can use.
These are known as transport mode or tunneling mode.
transport mode is going to use the packet's original IP header, and it's
used for client-to-site VPNs. This approach works really well if you have
problems increasing your packet size because you may end up hitting a
maximum transmission unit size or MTU inside your network. Remember,
by default, the MTU or maximum transmission unit size is set at 1500
bytes in most networks. If you go over 1500 bytes, the packet will become
fragmented and this can cause issues with your VPN's functionality. If
you're using a client-to-site VPN, I highly recommend you use transport
mode as your IPSec method, because it doesn't add additional padding to
your packet and doesn't increase its size.
Now, tunneling mode is used to encapsulate the entire packet and put
another header on top of it. This is going to increase the size of that
packet and it could go over your MTU.
This new header is going to have a new source and destination of the VPN
terminating devices at the different site that it wants to go to. When it
gets to the other site, the VPN concentrator is going to remove that outer
header inside of a network packet, decrypt the content, and then route it
across their private local area network, just as if it was coming from an
internally connected client.
When using tunneling mode you're encapsulating the entire packet into a
new packet. So this is going to increase the size of your overall packet.
And it could go above that MTU default size of 1500 bytes. if you're setting
up a site-to-site VPN, like having a regional office connecting back to a
main office, then I would use tunneling mode. If you're going to be using
a site-to-site VPN, you may need to allow jumbo frames, which is any
frame above the MTU size of 1500 bytes. This way it'll be properly
supported. Normally the best way to configure your devices would be to
drop your maximum MTU size on your inner router to something like 1400
bytes, and then connect it to the VPN. This way there's enough room to
add the extra encapsulation and the new packet header before
transmitting it out over the public internet inside your VPN tunnel. If you
control the entire network, you could actually raise your MTU size up to a
maximum of 9,000 bytes if you wanted to, but this should only be done on
your own local area networks because 9,000 byte packets will have
trouble traversing the internet.
transport mode is normally going to be used for client-to-site VPNs and
tunneling mode is normally going to be used for site-to-site VPNs.