Facebook :-) Check our facebook fan page!

What is Virtual Private Network


VPN Meaning and Definition

A Virtual Private Network or simply VPN technology is a used to exchange private data through the internet securely.

With a VPN, you can send data across shared or public networks as if their computers were directly connected to the private network.

One of the best things is that Virtual Private Network allows employees to securely access private (corporate) networks from outside.

A VPN can be used to connect not only people to the office from outside but they can be used to connect geographically separated offices of an organization. For example (Google Offices).

VPN Security

One of the main reasons many companies and even some people (for personal use) use VPN is because they offer Security using encryption methods.

There some methods a Hacker can use to intercept data travelling on a network like WiFi spoofing and Firesheep.

There is an important analogy you can use to your network. A firewall is useful to protect your computer data and a VPN is useful to protect your data on the web.

There are some VPN Security Technologies but one of the most used is IPsec.

IPsec stands for Internet Protocol Security it works on layer 3 of the OSI Model and is a network protocol suite that authenticates and encrypts the packets of data sent over a network.



VPN Types

Before MPLS, companies used to work with virtual circuits like Frame Relay and Asynchronous Transfer Mode (ATM) through dial-up modem or leased line connections. But, due to significant cost-reductions and increased bandwidth provided by new technologies such as Digital Subscriber Line (DSL) and fiber-optic networks many companies have switched to technologies like IP/Multi-protocol Label Switching (MPLS).

VPNs can be a remote access (connecting a computer to a network) or site-to-site (connecting two networks).

In a perspective of Remote Access, VPNs allow people to access their companies intranet networks from home or while travelling outside the office and site-to site when geographically disparate offices share their virtual networks.

That is the power of VPN. unfortunately we still have many people asking what is virtual private network or simply VPN Technology.

Just to give you more, you can use your site-to-site network to share a folder between two geographical separated accounting offices.

Yes i know it sounds good! Isn’t?


VPN Protocols

VPN Protocols still growing on the secure remote access technologies but there are some common which you can check bellow.

L2TP/IPsec – One of the most secure and used VPN technology is L2TP over IPsec, this protocol combines security and features into one package.

L2TP protocol is used to create a tunnel and IPsec provides a secure channel. This makes for an impressively secure package 2 in 1.

PPTP – PPTP is an old VPN technology that still around.

One of the best things on PPTP is that it’s simple and you can configure on every major OS.

Being around for a while, made this protocol a victim of questions about its security.

PPTP is not the most secure VPN protocol available out there but it still strong.

In the end it depends of the sensitivity of your data.

Open VPN – Open VPN is an SSL-based VPN and it still growing.

Open VPN is another robust and flexible software application that implements a VPN technique on site-to-site connections, and the best thing you can have here is that Open VPN is open-source, which means that you have rights to study, change and distribute or simply use it for free.

VPN Software’s

There are many VPN software out there like, Cisco VPN Client which have been replaced by Cisco Any Connect. But this one is more like a VPN Service.

Bellow you have some VPN Softwares like:

You can go to the links and check more. Just check which is more suitable for you.


Did you find this article useful? Let me know on the comments section and please read again if needed before asking again what is virtual private network.





Add a Comment

Your email address will not be published. Required fields are marked *