What is a virtual private network?

A private network is a network with protected access and secure transmission. It is possible to build such a network using privately owned or rented lines, but it is expensive. A virtual private network (VPN) is a network that uses public telecommunications infrastructure, such as the Internet to provide remote individuals or offices with secure network access at their central location or headquarters at significantly reduced costs. Personal data protection in a virtual private network is maintained by a combination of security procedures and data transfer system called tunneling or Port transmission . Standards for virtual private networks come from an Internet engineering working group (IETF).

Tunneling is a method of hiding from the public network that the fact that the data that is transmitted to it is part of the transfer of a private network. There are several ways to access tunneling. One is called the Point-to-Point tunneling protocol (PPTP). Developed backward Microsoft inThe connection with some other companies allows PPTP to access the virtual private network through the Internet service provider (ISP). The general routing (GRE), which has been developed by Cisco Systems, is an alternative tunnel protocol. Tunneling is not considered effective if it is not used in conjunction with encryption and decryption of data.

There are three types of virtual private networks. Trusted VPNs use dedicated circuits, but transmissions can be endangered when communication switches pass. The path of credible VPN must be set and consistent, with the determination of routing and addressing before use.

secured VPN are those that use encryption between the original computer or network up to the receiving computer or network. To secure, all traffic in the virtual private network must also encrypted and authenticated.In addition, the network must be protected from the external change of safety properties.

The

combination of secure VPN with trusted VPN provides a hybrid VPN. Often only part of the trusted VPN is safe VPN. In this case, it is important that everyone is clear about the boundaries of secure virtual private networks, so it is possible to make decisions considered to send different types of information across different parts of the network.

Virtual private networks are used for different purposes. Voice VPNs allow teleconference and business meetings with remote participants. Educational institutions can use VPN to grant members of the faculty access to the campus equipment and resources when they are outside the premises, and also when establishing distance education programs that students attend remotely.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?