Wednesday 23 March 2016

[INFO]What Actually is a VPN 2021



What is VPN?
The Virtual private Network (VPN) has up quick to become a serious networking technology in exactly many years. With a VPN, you'll send information, via a shared or public network in an exceedingly manner that emulates a point-to-point non-public link, between 2 networks (routers), between 2 servers, or between a consumer and a server. during this article, we are going to focus solely the VPN association mode between a consumer and a server. during this mode, the remote computer (installed with a VPN consumer software) utilizes existing telecommunications infrastructures (e.g., phone lines, broadband services, dedicated web link, etc), and a tunneling protocol (incorporated with different authentication and secret writing protocols) to firmly access resource within the company computer network through a VPN server that sits at the perimeter of the company network.
.
.
The following diagram depicts the VPN connection:
.
.

.
.
Why use VPN? 
.
By using VPN, enterprises can use the same un-trusted public networks operated by the Internet Service Provider without ever the need of any additional expensive private communication link to securely connect remote users' computers to the corporate network. Moreover, as the remote computer will be authenticated and the data exchanged with the VPN server are encrypted, hence, once a VPN connection has been successfully formed, the remote computer can be trusted by all local computers on the corporate LAN and logically be treated as a local computer.
.
.
How VPN works? 
.
To make use of the VPN, the remote computer (i.e., off-campus computers bearing non-corporate-owned IP addresses assigned by the Internet Service Provider (ISP)) must have the VPN client software installed. When connection to the corporate network is attempted, the VPN client software will first connect to the VPN server using a tunneling protocol (into which other authentication and encryption protocols have also been incorporated). After the remote computer has been successfully authenticated, a secure connection (secret tunnel) between it and the VPN server will then be formed as all subsequent data being exchanged through this tunnel will be encrypted at the sending end and correspondingly decrypted at the receiving end of the tunnel. As such, the network tunnel between them, even though established through the un-trusted Internet, is still considered secure enough that the remote computer can be trusted by local computers on the corporate LAN. In fact, the remote computer will even be allocated with an IP address from corporate's IP address space by the VPN server once successfully authenticated so that other local computers can communicate with it via the VPN server using that IP address. It is this automatic IP address translation between ISP's IP address and corporate's IP address offered by the VPN server which makes the remote PC look like a local computer.

0 comments: