Virtual Private Network (VPN)

From GM-RKB
(Redirected from Virtual private network)
Jump to navigation Jump to search

A Virtual Private Network (VPN) is a network service system that creates secure connections through virtual tunnels (to enable remote network access and site network connections across public networks).



References

2025-01-23

[1] https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/
[2] https://nordvpn.com/blog/protocols/
[3] https://aws.amazon.com/what-is/vpn/

2025

  • (Wikipedia, 2025) ⇒ https://en.wikipedia.org/wiki/Virtual_private_network Retrieved:2025-1-23.
    • Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).[1]

      A VPN can extend access to a private network to users who do not have direct access to it, such as an office network allowing secure access from off-site over the Internet.[2] This is achieved by creating a link between computing devices and computer networks by the use of network tunneling protocols.

      It is possible to make a VPN secure to use on top of insecure communication medium (such as the public internet) by choosing a tunneling protocol that implements encryption. This kind of VPN implementation has the benefit of reduced costs and greater flexibility, with respect to dedicated communication lines, for remote workers.

      The term VPN is also used to refer to VPN services which sell access to their own private networks for internet access by connecting their customers using VPN tunneling protocols.

2014a

  • (Wikipedia, 2014) ⇒ http://en.wikipedia.org/wiki/virtual_private_network Retrieved:2014-7-9.
    • A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. [3] A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. A virtual private network connection across the Internet is similar to a wide area network (WAN) link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.

      VPNs allow employees to securely access their company's intranet while traveling outside the office. Similarly, VPNs securely connect geographically disparate offices of an organization, creating one cohesive network. VPN technology is also used by Internet users to connect to proxy servers for the purpose of protecting personal identity and location.

  1. Cite error: Invalid <ref> tag; no text was provided for refs named NIST
  2. Cite error: Invalid <ref> tag; no text was provided for refs named Cisco
  3. Mason, Andrew G. Cisco Secure Virtual Private Network. Cisco Press, 2002, p. 7

2014b

  • http://en.wikipedia.org/wiki/Virtual_private_network#Type
    • VPN systems may be classified by:
      • the protocols used to tunnel the traffic.
      • the tunnel's termination point location, e.g., on the customer edge or network-provider edge.
      • whether they offer site-to-site or remote-access connectivity.
      • the levels of security provided.
      • the OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity.