Virtual Private Network (VPN) - Working

VPNs are used to securely communicate with different computers over insecure channels. VPN uses the Internet and ensures secure communication to distant offices or users within the enterprise’s network. Virtual private networks (VPNs) encrypt your data and hide your online activity from prying eyes.

VPN consists of four important components:

  • VPN Client
        A VPN client is a software-based technology that allows a user to establish a secure connection 
        with a VPN server. Some VPN clients run in the background, while others feature user-interactive
        front-end interfaces that allow them to be configured.
  • Tunnel Terminating Device
        A VPN server is a type of server that allows VPN services to be hosted and delivered. VPN clients
        connect to a secure and/or private network, or VPN, using a mix of VPN hardware and software
        technologies.

  • Network Access Server
        Any device that handles remote logins to establish a point-to-point protocol connection is referred 
        to as a network access server (NAS). For a user, a NAS serves as a portal to a larger pool of 
        resources. Before accessing the resources they require, the individual must navigate the NAS and 
        pass any authentication requirements.
  • VPN Protocol
       A VPN protocol is a collection of rules or instructions that govern the flow of data between your 
       computer (or another device) and the VPN server. Protocols are used by VPN services to maintain a
       safe and dependable connection.

The data is sent from your client's PC to a VPN network point. Your data is encrypted and sent over the internet by the VPN point. Your data is decrypted and sent to the appropriate internet resource, such as a web server, an email server, or your company's intranet, via another point in your VPN network. The data is then sent back to a location within your VPN network, where it is encrypted. That encrypted data is transferred over the internet to another location in your VPN network, where it is decrypted and returned to your client's PC.


Types of VPN Technologies

  • Point-to-Point Tunneling Protocol
        PPTP does not encrypt data on its own. It encapsulates data packets using the GRE protocol after 
        tunnelling them. If you're contemplating a VPN service that employs PPTP, bear in mind that 
        security experts like Bruce Schneier believe the protocol, particularly Microsoft's version, is 
        vulnerable.
  • IPSec
        You should think about using IPSec instead of PPTP. IPSec is a collection of protocols and 
        technologies that work together. The ESP protocol encapsulates packets, and encryption can be 
        done via AES-GCM, AES-CBC, 3DES-CBC, or HMAC-SHA1/SHA2.
  • L2TP (Layer 2 Tunneling Protocol)
        For enhanced security, L2TP may be used to tunnel with IPSec.
  • SSH
        It is a program that can manage both tunnelling and encryption in a VPN network.

You might be interested in, 

We hope this helps. If any suggestions or doubts you can add a comment and we will reply as soon as possible.

No comments:

Post a Comment