(1) Virtual Private Network (VPN) uses a tunnel data transfer protocol to prepare the data for transfer. To prevent disclosure of private information, VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques. The VPN security model provides: confidentiality, sender authentication and message integrity