VPNs are used to securely communicate with different computers over insecure
channels. VPN uses the Internet and ensures secure communication to distant
offices or users within the enterprise’s network. Virtual private networks
(VPNs) encrypt your data and hide your online activity from prying eyes.
VPN consists of four important components:
- VPN Client
with a VPN
server. Some VPN clients run in the background, while others feature
user-interactive
front-end
interfaces that allow them to be configured.
- Tunnel Terminating Device
A VPN
server is a type of server that allows VPN services to be hosted and
delivered. VPN clients
connect to
a secure and/or private network, or VPN, using a mix of VPN hardware and
software
technologies.
- Network Access Server
Any device
that handles remote logins to establish a point-to-point protocol
connection is referred
to as a network access server (NAS). For a user, a NAS serves as a portal
to a larger pool of
resources. Before accessing the resources they require, the individual
must navigate the NAS and
pass any
authentication requirements.
- VPN Protocol
A VPN protocol is a collection of rules or instructions that govern the
flow of data between your
computer (or another device) and the VPN server. Protocols are used by
VPN services to maintain a
safe and dependable connection.
The data is sent from your client's PC to a VPN network point. Your data is encrypted and sent over the internet by the VPN point. Your data is decrypted and sent to the appropriate internet resource, such as a web server, an email server, or your company's intranet, via another point in your VPN network. The data is then sent back to a location within your VPN network, where it is encrypted. That encrypted data is transferred over the internet to another location in your VPN network, where it is decrypted and returned to your client's PC.
Types of VPN Technologies
- Point-to-Point Tunneling Protocol
tunnelling
them. If you're contemplating a VPN service that employs PPTP, bear in
mind that
security
experts like Bruce Schneier believe the protocol, particularly Microsoft's
version, is
vulnerable.
- IPSec
You should think about using
IPSec instead of PPTP. IPSec is a collection of protocols and
technologies that work together. The ESP
protocol encapsulates packets, and encryption can be
done via
AES-GCM, AES-CBC, 3DES-CBC, or HMAC-SHA1/SHA2.
- L2TP (Layer 2 Tunneling Protocol)
- SSH
You might be interested in,
- What is VPN?
- Which VPN to choose?
- Weakness of a VPN?!
We hope this helps. If any suggestions or doubts you can add a comment and we
will reply as soon as possible.
No comments:
Post a Comment