Вы находитесь на странице: 1из 6

VIRTUAL PRIVATE NETWORK (VPN)

Brief Def;
A virtual private network (VPN) extends a private network across a public
network, and enables users to send and receive data across shared or public
networks as if their computing devices were directly connected to the private
network. Applications running on a computing device, e.g. a laptop, desktop,
smartphone, across a VPN may therefore benefit from the functionality, security,
and management of the private network.

Background;
VPN technology was developed to allow remote users and branch offices to access
corporate applications and resources. To ensure security the private network
connection is established using an encrypted layered tunneling protocol and VPN
users use authentication methods, including passwords or certificates, to gain
access to the VPN. In other applications, Internet users may secure their
transactions with a VPN, to circumvent geo-restrictions and censorship, or to
connect to proxy servers to protect personal identity and location to stay
anonymous on the Internet. A VPN is created by establishing a virtual point-to-
point connection through the use of dedicated circuits or with tunneling protocols
over existing networks.
Types of VPN’S
The confusion factor comes into play in the most basic discussions regarding
VPN’s. This is principally due to the fact that there are actually several different
types of VPN’s, and depending on the functional requirements, but basically there
are two types of VPN’s
 Remote Access VPN
A remote-access VPN allows individual users to establish secure connections with
a remote computer network. Those users can access the secure resources on that
network as if they were directly plugged in to the network's servers. An example of
a company that needs a remote-access VPN is a large firm with hundreds of
salespeople in the field
 Site – to – Site VPN
A Site-to-Site VPN is also called as Router-to-Router VPN and is mostly used in
the corporates. Companies, with offices in different geographical locations, use
Site-to-site VPN to connect the network of one office location to the network at
another office location. When multiple offices of the same company are connected
using Site-to-Site VPN type, it is called as Intranet based VPN. When companies
use Site-to-site VPN type to connect to the office of another company, it is called
as Extranet based VPN. Basically, Site-to-site VPN create a virtual bridge
between the networks at geographically distant offices and connect them through
the Internet and maintain a secure and private communication between the
networks.
VPN PROTOCOLS
 Internet Protocol Security or (IPSEC):
Internet Protocol Security is used to secure Internet communication across an IP
network. IPSEC secures Internet Protocol communication by authenticating the
session and encrypts each data packet during the connection.
IPSEC operates in two modes, Transport mode and Tunneling mode, to protect
data transfer between two different networks. The transport mode encrypts the
message in the data packet and the tunneling mode encrypts the entire data packet.
IPSEC can also be used with other security protocols to enhance the security
system.

 Layer 2 Tunneling Protocol (L2TP):


L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is usually
combined with another VPN security protocol like IPSEC to create a highly secure
VPN connection. L2TP creates a tunnel between two L2TP connection points and
IPSEC protocol encrypts the data and handles secure communication between the
tunnel.

 Point – to – Point Tunneling Protocol (PPTP):


PPTP or Point-to-Point Tunneling Protocol creates a tunnel and encapsulates the
data packet. It uses a Point-to-Point Protocol (PPP) to encrypt the data between the
connection. PPTP is one of the most widely used VPN protocol and has been in
use since the time of Windows 95. Apart from Windows, PPTP is also supported
on Mac and Linux.

 Secure Sockets Layer (SSL) and Transport Layer Security (TLS):


SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a VPN
connection where the web browser acts as the client and user access is restricted to
specific applications instead of entire network. SSL and TLS protocol is most
commonly used by online shopping websites and service providers. Web browsers
switch to SSL with ease and with almost no action required from the user, since
web browsers come integrated with SSL and TLS. SSL connections have https in
the beginning of the URL instead of http.

 OpenVPN:
OpenVPN is an open source VPN that is useful for creating Point-to-Point and
Site-to-Site connections. It uses a custom security protocol based on SSL and TLS
protocol.

 Secure Shell (SSH):


Secure Shell or SSH creates the VPN tunnel through which the data transfer
happens and also ensures that the tunnel is encrypted. SSH connections are created
by a SSH client and data is transferred from a local port on to the remote server
through the encrypted tunnel.

ADVANTAGES OF VPN
 Enhanced security. When you connect to the network through a VPN, the
data is kept secured and encrypted. In this way, the information is away from
the hackers’ eyes.

 Remote control. In case of a company, the great advantage of having a VPN


is that the information can be accessed remotely even from home or from
any other place. That’s why a VPN can increase productivity within a
company.

 Share files. A VPN service can be used if you have a group that needs to
share data for an extended period.

 Online anonymity. Through a VPN you can browse the web in complete
anonymity. Compared to hide IP software or web proxies, the advantage of a
VPN service is that it allows you to access both web applications and
websites in complete anonymity.

 Unblock websites & bypass filters. VPNs are great for accessing blocked
websites or for bypassing Internet filters. This is why there is an increased
number of VPN services used in countries where Internet censorship is
applied.

DISAVANTAGES OF VPN

 It Might Add More Cost to Your Network Connection.


By default, the virtual private network is a premium private connection service that
you need to pay separately from your regular network connection or ISP Also, if
you want to use a VPN router, you have to purchase an additional router hardware
to be able to be used alongside your VPN connection.

 Using VPN Might Actually Be Illegal In Your Country


There are some countries that don’t allow their citizens to use any type of VPN
service. In fact, most VPN services will be blocked in the countries that consider
private networks to be illegal. This is the first disadvantage that you need to deal
with.

 You Might Have Performance Issues While Using The Private Network
Since the private network connection works by connecting your network to a
private server before you can actually access the website that you want to visit, it
might create a performance problem in the process.

Вам также может понравиться