MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
6.1 VPN Basics Explained

6.1 VPN Basics Explained

Key Concepts

1. VPN Overview

A Virtual Private Network (VPN) is a technology that creates a secure, encrypted connection over a less secure network, such as the internet. VPNs allow users to send and receive data as if their devices were directly connected to a private network, ensuring privacy and security.

Example: Think of a VPN as a secure tunnel that protects your data as it travels from your device to a remote server. Just as a tunnel keeps you safe from external threats, a VPN keeps your data safe from prying eyes.

2. Types of VPNs

There are several types of VPNs, each serving different purposes:

Example: Consider a remote access VPN as a key that unlocks a door to your office from home. A site-to-site VPN is like a secure bridge connecting two buildings, allowing people to move freely between them.

3. VPN Protocols

VPN protocols define the methods used to secure data transmission over a VPN. Common VPN protocols include:

Example: Think of VPN protocols as different types of locks on a door. Each lock (protocol) has its own level of security and ease of use, but they all serve the same purpose of keeping the door (data) secure.

4. VPN Encryption

VPN encryption is the process of converting data into a secure format that cannot be easily understood by unauthorized users. Common encryption algorithms used in VPNs include AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), and Blowfish.

Example: Consider encryption as a secret code. Just as a code protects a message from being read by others, encryption protects data from being intercepted and understood by unauthorized users.

5. VPN Use Cases

VPNs are used in various scenarios to enhance security and privacy:

Example: Think of a VPN as a secure briefcase for carrying sensitive documents. Just as a briefcase protects documents from being seen or tampered with, a VPN protects data from being intercepted or compromised.