Virtual Private Network (VPN)
A Virtual Private Network (VPN) is a network service system that creates secure connections through virtual tunnels (to enable remote network access and site network connections across public networks).
- Context:
- It can establish Secure Network Connection through virtual tunneling protocols and encryption algorithms.
- It can protect Network Traffic through traffic encryption and secure routing.
- It can enable Remote Network Access through authenticated connections.
- ...
- It can often provide Geographic Access through proxy connections and server locations.
- It can often support Mobile Access through cellular connections and mobile protocols.
- It can often include Security Features through kill switches and leak protection.
- ...
- It can range from being a Remote Access VPN to being a Site-to-Site VPN, depending on its connection topology.
- It can range from being a Basic VPN to being an Enterprise VPN, depending on its security requirements.
- It can range from being a Software VPN to being a Hardware VPN, depending on its implementation type.
- ...
- It can integrate with Cloud Service for cloud network access.
- It can connect to Corporate Network for business network access.
- It can support Consumer Service for personal privacy protection.
- ...
- Examples:
- one at organization X
- one provided by service Y
- ...
- Counter-Examples:
- Proxy Service, which only provides network address masking without full traffic encryption.
- Wide Area Network, which uses dedicated physical connections rather than virtual connections.
- Virtual Private Cloud, which creates isolated cloud networks rather than virtual network tunnels.
- See: Network Security System, Privacy Protection Service, Remote Access System, Network Service.
References
2025-01-23
- Perplexity.ai
- Question: What is a VPN and its different types? Please explain its key components, classifications, and common applications. Include information about security features and protocols.
- Answer: A VPN is a network technology that creates an encrypted connection over a public network, allowing users to securely access and transmit data as if they were directly connected to a private network.
- VPN Types:
- Remote Access VPN:
- Connects individual users to a remote network.
- Used by employees for remote work access to company resources.
- Enables secure file access and software access from any location.
- Supports geo-restriction bypass and public Wi-Fi protection.
- Site-to-Site VPN:
- Connects multiple networks across untrusted networks.
- Intranet VPN: Links multiple LANs within one company.
- Extranet VPN: Links different company networks.
- Cloud VPN:
- Connects users to cloud infrastructure and services.
- Offered by cloud providers like AWS and Azure.
- Uses standard encryption protocols.
- Remote Access VPN:
- Key Components:
- Tunneling Protocols:
- OpenVPN: Open-source with strong security.
- IKEv2/IPSec: Stable for mobile VPNs.
- WireGuard: Modern high-speed protocol.
- Security Features:
- Tunneling Protocols:
- Common Applications:
- VPN Types:
- Citations:
[1] https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/ [2] https://nordvpn.com/blog/protocols/ [3] https://aws.amazon.com/what-is/vpn/
2025
- (Wikipedia, 2025) ⇒ https://en.wikipedia.org/wiki/Virtual_private_network Retrieved:2025-1-23.
- Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]
A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet.[2] This is achieved by creating a link between computing devices and computer networks by the use of network tunneling protocols.
It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements encryption. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for remote workers.
The term VPN is also used to refer to VPN services which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.
- Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]
2014a
- (Wikipedia, 2014) ⇒ http://en.wikipedia.org/wiki/virtual_private_network Retrieved:2014-7-9.
- A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. [3] A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. A virtual private network connection across the Internet is similar to a wide area network (WAN) link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.
VPNs allow employees to securely access their company's intranet while traveling outside the office. Similarly, VPNs securely connect geographically disparate offices of an organization, creating one cohesive network. VPN technology is also used by Internet users to connect to proxy servers for the purpose of protecting personal identity and location.
- A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. [3] A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. A virtual private network connection across the Internet is similar to a wide area network (WAN) link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.
2014b
- http://en.wikipedia.org/wiki/Virtual_private_network#Type
- VPN systems may be classified by:
- the protocols used to tunnel the traffic.
- the tunnel's termination point location, e.g., on the customer edge or network-provider edge.
- whether they offer site-to-site or remote-access connectivity.
- the levels of security provided.
- the OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity.
- VPN systems may be classified by: