How to use VPN's

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

36 minutes
Video Transcription
Hello, everybody. And welcome to this lecture and the sexual we're talking about VP ends, which are virtual private network. Basically, think of this as an extender from your whatever network you're working, whether if it's like your office network or your home network. Or maybe your network in the cloud, you're extending that network out, too.
A location abroad, so in in the sense of a cloud
it Let's say you created your V P. C, your virtual private cloud, where you have your whole architecture already deployed. And now it's time to expand that architecture, that that infrastructure out to your office location. You can use a VPN to do that by using the same cider block network for your cloud
and allowing your workstation in your office or your home
to access that attain an I P address in the Cloud Network and be able to interact with the resource. Is that air in the in the cloud network?
So what do I mean by that? So let's say this here is your home computer or your office computer, and here's Thekla loud, easy to instance server that you need to access. Let's say this is an active directory server. In order for you to do that, you know your your I P address. Currently, before accessing the VPN
is set to your home network, which is probably 192.168 dot zero dots 23 or something like that, Right?
In order for you to change your i p address so that it can communicate with thesis server and the clown,
you need to use a VPN which is going to extend the cloud network out to this computer, your your work or your home computer so that you can interact with it. So you log into the VPN the using your credentials you authenticated and you authorize yourself in,
and then from there you can go ahead and access the resource is and
the cloud in your cloud network. And to kind of formalize this, I found a corporate network diagram. That kind of gives you an example of what we're talking about here. So here's your V p C, which is a virtual private cloud. Just that just means that your your virtual private cloud network in eight of us
and here you are at your corporate office with any I p A. You have 192.168 or $10.0.0 that 25 or whatever it is,
whatever your I P addresses and you need to change your i p address to 17 to 16 10 dot something something right or 11 something something in order feed access. These resource is right here. You can't do that unless you use a VPN to gain access to this.
And with eight of us, you can set that up. There's multiple ways you can go about its at one popular ways to use an open source tool called open VPN. You can look it up. It's very simple to deploy. It only takes a few minutes for you to set up in the sea to instance
and put that in your VP sees that you can log into it and gain access to the cloud,
uh, resource that you have over an eight of us. But once you have access that using open VPN, you're able to access, let's say your public sentiment and then from there you can grab access to your private some. This you can stick a bashing hosting here which will talk about shortly,
or you can, you know, just set up any type of you know,
uh, instances that you need to gain access to. Maybe there's not so sensitive information, so you don't need this exact architecture. But the idea is that you can gain access that you conjoined this network by extending this network out to wherever your location has, whether you're at the office or at home,
or a coffee shop or whatever
it's very severely simple concept. If you've been doing, I t It'll VP ends and the cloud work very similar to the PM's Ah and your on premise environments. There's not really a difference in technology. The only difference is that the network that you're connecting to is in the cloud,
and obviously that's a little bit of a different animal, cause you're not handling it. It's maintained by somebody else. But you can't handle certain components
like, you know, in the end points that you're interacting with and how your sub nets are split up and stuff like that.
All right, that about wraps up this lecture. If you guys have any questions, feel free to reach out to me. I'll see you guys in the next one
Up Next