All About VPNs: Applications and Remote Access

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

All About VPNs: Applications and Remote Access:

A Virtual Private Network (VPN) will allow a remote user to produce a VPN to the corporate network on the Internet. Users can dial-up to a local Internet service provider (ISP) rather than having to make long distance calls to connect to a corporate network. The user can call the local ISP. Through this connection a virtual private network is established between the remote user and the corporate VPN server across the Internet. A dedicated line or dial-up can be used to connect to an ISP when establishing a VPN connection.

VPNs provide secure remote connections when communicating across a public network (the Internet) to protect confidentiality and prevent corruptibility of data preserving its authentication. Therefore, VPN connections are remote access connections that provide the same scale of security available on a LAN. This is accomplished through the tunneling method which transmits data from one computer to another by placing a sheathe over the data packets in an additional header. The additional header contains routing information so that the encapsulated payload can be transmitted across the public network. Both the client and tunnel server must use the same tunneling protocol for a tunnel to be set in place. Tunneling technology can be based on either a Layer 2 or a Layer 3 tunneling protocol. It’s important to remember that tunneling coupled with a VPN connection isn’t a true substitute for encryption/decryption. When the highest level of security is required, the best possible encryption should be used within the VPN itself.

The two types of configurations for a VPN:

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?