Virtual Private Network in Network Security

What is Virtual Private Network ? And Why Do Organization Need Them ?

A virtual private network(VPN) is a network of virtual circuits that carries private traffic through public or shared networks such as the internet or those provided by network service providers. VPNs allow a trusted network to communicate with another trusted network over untrusted /public network such as the internet.VPNs are used primarily to extend an enterprise’s internal private network(intranet) across untrusted public networks. They provide the capability to securely convey information across the public network into the corporate network.

Characterstic of Virtual Private Network

  • Traffic is encrypted to prevent evasdropping
  • Remote site is authenticated
  • Multiple protocols are supported
  • Connection is point to point.

Types of VPN

Remote Access VPN

  • It is a solution that allows access to anywhere as long as their is an internet access with the special encrypted code to the employees with the separte passward and ids.
  • if the employees work on a workstation at the headquater that is virtually connected to their organizational computer network then this VPN helps him to access the information assets residing on the network.
  • It help to see an indiviual user machine and an organizational site on network with remote access VPN.
  • It is used by employees who want to work on travelling or work from home.
  • The VPN server used is may be organization firewall or may be a separte VPN Server.
  • In remote access VPN the user connects to the internet by a local ISP dial up, digital subcribers line or calll moderm and intialies VPN to organization site via the internet.
  • The network connection is slower due to the the limiting factor in the VPN Connection.

Site to Site VPN

  • Site to site VPN is a virtual chains connected with thr removable link with the access points such as satellite, Home, offices.
  • Using the internet the satellite office can initialize the encryption security to put the connection link in place and making a conncetion between their LAN and the headquaters.

How VPN Works?

  • Once you have done all the prepartion work there shouls be nothing left to hinder a successful VPN Connection.
  • If you now wish to access your desktop computer while away from home, all you need is an internet connection.
  • Once you are connected to the internet, you will need to start a VPN connection by opening the network and sharing center
  • And by clicking on the “Connect to network” option in the window that opens up.
  • Then, selects the connection that you have just created.
  • And click “establish Connection”.
  • In the Subsequent dialog box, enter your username and password and click on done.
  • Your VPN connection will be established.

Need of Firewall in VPN

Firewalls play a key role in securing the network against threats. Firewalls can be relied on to secure the network from unwanted and unauthorized threats from the internet. In addition, they can be used to control internal access to external access or resource. VPNs are used to securely connect all offices and the employees working outside the offices of the enterprise. A combination of firewalls and VPNs is used to enable authorized remote clients to gain access to sensitive information.

Authentication Mechanism of Virtual Private Network

A VPN involves two entities:- the protected or ‘inside’ network, which provides physical and administrative security to protect the transmission and a less trustworthy that is ‘untrusted’ outside network or segment. A firewall site between remote users workstation establishes and the host network or server. As the user client may pass authentication data to an authentication service inside the perimeter.

For better security, many VPN client programs can be configured to require that, all IP traffic must pass through the tunnel while the VPN is active with n organization’s internal network. That is protected from the outside internal by a firewall, people who share it may be simultaneously working for different employers over their respective VPN connections from the shared internal network. Each employer would therefore be safe and secure even if another computer in local gets infected with malware.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments