5.3 VPN Fundamentals

Key Takeaways

  • A VPN creates an encrypted tunnel over a public network (internet) for secure communication.
  • Site-to-site VPNs connect entire networks (office to office) and are always on.
  • Remote access VPNs connect individual users to the corporate network from anywhere.
  • IPsec provides encryption (ESP) and authentication (AH) at Layer 3 for site-to-site VPNs.
  • SSL/TLS VPNs operate at Layer 4-7 and are commonly used for remote access (no client software needed for clientless).
Last updated: March 2026

VPN Fundamentals

A VPN (Virtual Private Network) creates an encrypted tunnel over a public network (typically the internet), allowing secure communication as if the endpoints were on the same private network.

VPN Types

Site-to-Site VPN

FeatureDetail
ConnectsTwo networks (e.g., headquarters ↔ branch office)
EndpointsRouters or firewalls at each site
StatusAlways on (permanent tunnel)
ProtocolIPsec (most common)
UsersTransparent to end users — they don't know they're using a VPN

Remote Access VPN

FeatureDetail
ConnectsIndividual user to the corporate network
EndpointsUser's device ↔ VPN gateway (firewall/router)
StatusOn-demand (user initiates connection)
ProtocolSSL/TLS (clientless or AnyConnect) or IPsec
UsersMust initiate the VPN connection

IPsec (Internet Protocol Security)

IPsec is a suite of protocols that provides security at Layer 3 (Network layer). It is the standard for site-to-site VPNs.

IPsec Protocols

ProtocolFunctionIP Protocol
ESP (Encapsulating Security Payload)Encryption + authentication + integrityIP protocol 50
AH (Authentication Header)Authentication + integrity only (no encryption)IP protocol 51
IKE (Internet Key Exchange)Negotiates encryption keys and security associationsUDP port 500

ESP is used in most deployments because it provides both encryption and authentication. AH provides only authentication without encryption.

IPsec Modes

ModeDescriptionUse Case
Tunnel modeEncrypts the entire original IP packet and adds a new IP headerSite-to-site VPN (default)
Transport modeEncrypts only the payload, original IP header remainsHost-to-host communication

IPsec Phase 1 and Phase 2

PhasePurposeResult
Phase 1 (IKE SA)Authenticate peers, negotiate encryption parametersSecure management tunnel
Phase 2 (IPsec SA)Negotiate data encryption parametersEncrypted data tunnel

SSL/TLS VPN

SSL/TLS VPNs operate at Layer 4-7 and use the same encryption technology as HTTPS (port 443).

Clientless SSL VPN

  • Access through a web browser — no software installation needed
  • Limited to web applications, email, file shares
  • Good for contractors and BYOD devices

Full-Tunnel SSL VPN (Cisco AnyConnect)

  • Requires client software (AnyConnect) on the user's device
  • All traffic from the device goes through the VPN tunnel
  • Provides full network access similar to being on-site

VPN Comparison

FeatureIPsec Site-to-SiteIPsec Remote AccessSSL/TLS Remote Access
LayerLayer 3Layer 3Layer 4-7
Client neededNo (router-to-router)Yes (IPsec client)Optional (browser or AnyConnect)
Access typeFull networkFull networkFull or limited (web-based)
PortUDP 500, IP 50/51UDP 500, IP 50/51TCP 443
Firewall friendlyMay be blockedMay be blockedVery friendly (uses HTTPS port)

On the Exam: Know the difference between site-to-site and remote access VPNs. Understand that IPsec operates at Layer 3 with ESP (encryption + auth) and AH (auth only). SSL/TLS VPNs use TCP 443 and are more firewall-friendly.

Test Your Knowledge

Which IPsec protocol provides both encryption AND authentication?

A
B
C
D
Test Your Knowledge

What type of VPN connects two networks (e.g., headquarters to a branch office) and is always on?

A
B
C
D