Virtual Private Network
(Redirected from Virtual private network)
Jump to navigation
Jump to search
A Virtual Private Network is a Private Network that operates within a public network (typically the Internet network).
- Context:
- It can be established through a Virtual Point-to-Point Connection (with the use of dedicated connections, virtual tunneling protocols, or traffic encryptions).
- It can range from being a Remote-Access VPN (connecting a networked computer to a remote computer network) to being a Site-to-Site VPN (connecting two computer networks).
- It can be supported by a VPN Software System (with a VPN server and VPN client).
- Example(s):
- an OpenVPN-based VPN (uses OpenVPN).
- VigLink's VPN.
- VigLink's Private Network.
- See: Virtual Private Cloud, Point-to-Point (Network Topology), Wide Area Network, Proxy Server, AWS VPC.
References
2014
- (Wikipedia, 2014) ⇒ http://en.wikipedia.org/wiki/virtual_private_network Retrieved:2014-7-9.
- A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. [1] A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. A virtual private network connection across the Internet is similar to a wide area network (WAN) link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.
VPNs allow employees to securely access their company's intranet while traveling outside the office. Similarly, VPNs securely connect geographically disparate offices of an organization, creating one cohesive network. VPN technology is also used by Internet users to connect to proxy servers for the purpose of protecting personal identity and location.
- A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. [1] A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. A virtual private network connection across the Internet is similar to a wide area network (WAN) link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.
- ↑ Mason, Andrew G. Cisco Secure Virtual Private Network. Cisco Press, 2002, p. 7
- http://en.wikipedia.org/wiki/Virtual_private_network#Type
- VPN systems may be classified by:
- the protocols used to tunnel the traffic.
- the tunnel's termination point location, e.g., on the customer edge or network-provider edge.
- whether they offer site-to-site or remote-access connectivity.
- the levels of security provided.
- the OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity.
- VPN systems may be classified by: