This report explains the three mechanisms for VPN working, authentication header and encapsulating security payload protocols, VPN tunnel modes, and components for phase 2 IKEv1. It also highlights the significance of VPN in securing data transfer. The report concludes with a discussion on the vulnerability of Diffie Hellman to attacks.