VPN NEWS | VPN GUIDES | WEB HOST INDUSTRY REVIEW
find vpn - virtual private network solutions  
Find VPN: BTInet | DataSide

FIND VPN for Monday, October 06, 2008  

What is a VPN? .. Explaining Virtual Private Networks

As it is most commonly defined, a virtual private network (VPN) allows two or more private networks to be connected over a publicly accessed network. In a sense, VPNs are similar to wide area networks (WAN) or a securely encrypted tunnel, but the key feature of VPNs is that they are able to use public networks like the Internet rather than rely on expensive, private leased lines. At they same time, VPNs have the same security and encryption features as a private network, while taking the advantage of the economies of scale and remote accessibility of large public networks.

A VPN is an especially effective means of exchanging critical information for employees working remotely in branch offices, at home, or on the road. It can securely deliver information between vendors, suppliers, and business partners, who may have a huge physical distance between them. Since companies no longer have to invest in the actual infrastructure themselves, they can reduce their operational costs by outsourcing network services to service providers. VPNs can also reduce costs by eliminating the need for long-distance telephone charges to obtain remote access, as client need only call into the service provider's nearest access point.

VPNs today are set up a variety of ways, and can be built over ATM, frame relay, and X.25 technologies. However, the most popular current method is to deploy IP-based VPNs, which offer more flexibility and ease of connectivity. Since most corporate intranets use IP or Web technologies, IP-VPNs can more transparently extend these capabilities over a wide network. An IP-VPN link can be set up anywhere in the world between two endpoints, and the IP network automatically handles the traffic routing.

Privacy and protection of data is of utmost importance when deploying services over the Internet, where it can be vulnerable to attacks or illegal entry. Secure IP-VPNs are networks that are secured by encryption and authentication, and layered on an existing IP network. In response to security issues, the Internet Engineering Task Force (ietf.org) has developed the IP Security (IPSec) protocol suite, a set of IP extensions that offer strong data authentication and privacy guarantees.

Although security features differ from product to product, most IP-VPN providers generally private network tunnelling through the IP backbone, data encryption, authentication proxying,, firewall, and spam filtering.

VPN products fall into three broad categories: hardware-based systems, firewall-based systems, and standalone application packages. Most hardware-based VPNs are encrypting routers, which are considered secure and simple to use, as they are the nearest thing to "plug-and-play" equipment available. However, they may not be as flexible as software-based systems, which are ideal in situations where both endpoints of a VPN are not controlled by the same organization, which is typical for business partnerships or when client support is required. Firewall-based VPNs are considered among the most secure, as they take advantage of the firewall's existing security mechanisms. However, if the firewall is already loaded, performance issues may pop up.

However, as the VPN market continues to rapidly evolve, the lines between different VPN architectures are increasingly blurred; many hardware vendors have included software clients to their product offerings, and extended their server capabilities to include the security features found in software- or firewall-based VPNs. Similarly, some standalone products have added support for hardware-based encryptors to boost their performance.

Companies providing managed VPN services will usually bundle other value-added services to their secure global connectivity such as consulting, design and support for emerging applications, such as voice over IP, e-commerce, and network-hosted applications.

VPN News Headlines



FREE Whitepapers on Leading VPN solution: Fast & Secure - Download them here!

VPN GUIDES, VIRTUAL PRIVATE NETWORK

Get information on VPN, VPN encryption and network security. Our VPN guides provide the information you need about VPN.

Frequently Asked Questions About VPN's
Here are some of the more common questions we receive about VPNs.


What is a Virtual Private Network or VPN?
In a sense, VPNs are similar to wide area networks (WAN) or a securely encrypted tunnel, but that they are able to use public networks like the Internet rather than expensive, private leased lines.


How Do I Choose a VPN Solution
Deciding whether a VPN solution is right for your enterprise, and how you should go about implementing one.


How Does a VPN Actually Work?
The current generation of VPNs is an advanced combination of tunneling, encryption, authentication and access control technologies and services ...


Introduction to VoIP
Simply put, voice over IP (VoIP) technology, or IP telephony, as it is often called, is a system for transmitting telephone calls over data networks.


Benefits of a Virtual Private Network
There are a number of reasons to set up a VPN for remote access, but the biggest selling point by far is the potential cost savings.


Explaining VPN Security
The key word in "virtual private networks" is private. The last thing a business wants, is to have sensitive corporate information end up in the hands of the competition.


About VPN Encryption
Most modern VPNs use some kind of cryptosystem, in order to scramble data into cipher text, which is then decrypted into readable text by the recipient.


Introduction to FreeS/WAN
FreeS/WAN is a Linux implementation of the IPSec security protocol, the basis for VPN technology ...


Explaining Multi-protocol Label Switching (MPLS)
MPLS is not designed to replace IP. Rather, it is designed to add a set of rules to IP so that traffic can be classified, marked and policed ...


 
Privacy | About Us   Copyright 2007 Web Host Industry Review, Inc.