MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
6 VPN Technologies Explained

6 VPN Technologies Explained

Key Concepts

1. VPN Basics

A Virtual Private Network (VPN) extends a private network across a public network, enabling secure communication between remote sites or users. VPNs use encryption and tunneling protocols to ensure data confidentiality, integrity, and authenticity.

Example: Think of a VPN as a secure tunnel that connects two points. Just as a tunnel allows safe passage through a mountain, a VPN allows secure data transmission over the internet.

2. IPsec VPN

IPsec (Internet Protocol Security) is a suite of protocols used to secure IP communications by authenticating and encrypting each IP packet. IPsec VPNs are commonly used for site-to-site and remote access VPNs, providing strong security features.

Example: Consider IPsec as a fortified envelope for letters. Just as a fortified envelope protects the contents from being tampered with, IPsec protects data packets from unauthorized access and modification.

3. SSL/TLS VPN

SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are cryptographic protocols that provide secure communications over a network. SSL/TLS VPNs are often used for remote access, allowing users to securely connect to a network using a web browser.

Example: Think of SSL/TLS as a secure lock on a door. Just as a lock ensures that only authorized people can enter a room, SSL/TLS ensures that only authorized users can access a network.

4. L2TP VPN

Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support VPNs. L2TP itself does not provide encryption; it typically works in conjunction with IPsec to create a secure VPN connection. L2TP is often used for remote access VPNs.

Example: Consider L2TP as a tunnel without walls. Just as a tunnel without walls needs additional protection (like walls) to be secure, L2TP needs IPsec to provide encryption and security.

5. PPTP VPN

Point-to-Point Tunneling Protocol (PPTP) is an older VPN protocol that creates a tunnel between a remote user and a private network. PPTP is less secure than modern protocols like IPsec and SSL/TLS, but it is still used in some environments due to its simplicity and ease of setup.

Example: Think of PPTP as an older, less secure tunnel. Just as an older tunnel might have weaker construction, PPTP has fewer security features compared to newer protocols.

6. GRE VPN

Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an IP network. GRE VPNs are often used to create tunnels for routing protocols or multicast traffic.

Example: Consider GRE as a versatile container. Just as a container can hold various types of goods, GRE can encapsulate different types of network traffic, making it flexible for various uses.