News By Tag Industry News * Wireless Security devices * More Industries... News By Location Country(s) Industry News
| Virtual Private Networks and VPN FunctionalityA virtual private network (VPN) allows for secure communications across insecure mediums. VPNs are useful in wireless networks as the wireless medium is inherently insecure.
By: Betty Yuan A virtual private network (VPN) allows for secure communications across insecure mediums. VPNs are useful in wireless networks as the wireless medium is inherently insecure. They are also useful for internal wireless connections to the wired network or for securely accessing services across the Internet in public hotspots. In this section, I explain what a VPN is and give some examples of useful scenarios where VPN technology can be utilized. VPN Functionality While the acronym VPN stands for virtual private networking, you might think of the technology as encrypted public networking. A secure VPN connection tunnels encrypted data across an insecure connection. For example, you connect to the Internet (an insecure connection) and then use a VPN protocol to connect to a corporate server at work (a secure connection). VPN connections can be many-to-one or one-to-one. Many-to-One VPN In a many-to-one scenario, you have one VPN server that many VPN clients connect to. This scenario is common when you have mobile workers who need to access the corporate network. They connect to their Internet service the data is unencrypted (unless an additional encryption standard is used on the local network) as it travels the local network on its way to the VPN connection. The data is then encrypted and transferred across the VPN connection (this is called tunneling) and decrypted at the other end. Now, the data travels unencrypted on the destination network. The tunnel, once created, is "transparent" VPN Protocols There are three common VPN protocols in use on networks today: the Point-to-Point Tunneling Protocol (PPTP), the Layer 2 Tunneling Protocol (L2TP)/IPSec (IP Security), and the Secure Shell (SSH) protocol. Please visit the related security products: http://www.techhoo.com/ # # # We are located in the most prosperous of electronic manufacturing base,we can support mobile phones, memory cards, digital audio players, computers and peripheral accessories of consumer electronics- End
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||