#VPN — Virtual Private Network FAQS

Posted: May 24, 2013 in Uncategorized


What is a #VPN?
A VPN provides a secure way to access network resources over the Internet or other public or private networks and allows you to connect to a remote network and become a node on that network.
VPNs use tunneling, encryption, authentication,
and access control over a public network at the same time for security.
Although they often use public networks, VPNs inherit the characteristics of a private network, thus the “Virtual” Private Network. A VPN can be a better alternative to traditional dial-up connections to provide access to remote users and telecommuters. It can also take the place of the public switched telephone network or dedicated leased lines to connect LANs in different sites. VPNs can also be used to give customers, clients and consultants access to corporate resources.

How does it work?
VPN’s create “virtual” point-to-point connections using a technique called tunneling. As the name suggests, tunneling acts like a “pipe” which penetrates through a network to connect two points. Normally activated by remote users, tunneling encrypts data into standard TCP/IP packets and encapsulates it for safe transmission across the Internet. VPN ensures the confidentiality and integrity of information as it travels over the public internet because it requires:
*Remote user identity authentication
*Secure private transmission of data (no unauthorized listeners)
*Verification of unadulterated data transmission

The VPN connection behaves like this:
*You connect to the Internet in the normal manner, through your ISP.
*The VPN client software on your computer initiates a connection with the VPN server.
*The VPN server encrypts the data on the connection so it cannot be read by others while it is in transit.
*The VPN server decrypts the data and passes it on to other servers and resources.

Are VPN’s really secure?
Any data packets that move across a publicly shared network like the Internet are potentially vulnerable to tampering. VPNs address that issue by employing multiple security mechanisms.But, what is safe enough?
VPNs that employ multiple security systems, like additional hardware devices, software patches and security standards, can be considered secure. In most cases, security vulnerabilities will be introduced by the users, rather than the system.



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s