Home     
 
 


   Top Subjects

CD Burners
Home Networking
RAM
Computer Viruses
Web Servers

Sponsored By:

   Categories
  
Hardware
Internet
Peripherals
Security
ShortStuff
Software
Browse the Computer Library

    
Main > Computer > Security

How Virtual Private Networks Work
by Jeff Tyson


 Introduction to How Virtual Private Networks Work
› What Makes A VPN?
Analogy: Each LAN is an Island
VPN Security
VPN Technologies
Tunneling
Lots More Information

What Makes A VPN?
There are two common VPN types:
  • Remote-access - Also called a virtual private dial-up network (VPDN), this is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote-access VPN will outsource to an enterprise service provider (ESP). The ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network.

    A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field. Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider.

  • Site-to-site - Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be either:
    • Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.
    • Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.


Image courtesy Cisco Systems, Inc.
Examples of the three types of VPN

A well-designed VPN can greatly benefit a company. For example, it can:

  • Extend geographic connectivity
  • Improve security
  • Reduce operational costs versus traditional WAN
  • Reduce transit time and transportation costs for remote users
  • Improve productivity
  • Simplify network topology
  • Provide global networking opportunities
  • Provide telecommuter support
  • Provide broadband networking compatibility
  • Provide faster ROI (return on investment) than traditional WAN

What features are needed in a well-designed VPN? It should incorporate:

  • Security
  • Reliability
  • Scalability
  • Network management
  • Policy management

Lowest Price
1.Linksys EtherFast Cable/DSL Firewall Router 4 Port Switch VPN ENDPOINT $53.90
2.LINKSYS-CISCO VPN ROUTER WITH 8 PORT 10/100 SWITCH $259.00
3.NetGear FVS318 Cable/DSL Prosafe VPN Firewall Internet Gateway Router w/8-Port Switch $97.00
4.SNAPGEAR SME530 2 Port VPN Firewall $329.77
5.Linksys EtherFast Cable/DSL VPN Router w/4-Port Switch $98.21

 

 
<< Prev Page    Intro    Next Page >>

  HSW Home


Table of Contents:
Introduction to How Virtual Private Networks Work
› What Makes A VPN?
Analogy: Each LAN is an Island
VPN Security
VPN Technologies
Tunneling
Lots More Information


 
Search Google:
powered by Google  
Rate this Article!
 


Copyright � 1998-2003 Howstuffworks, Inc. All rights reserved.

Lycos (R) s a registered trademark of Carnegie Mellon University.

Privacy Policy | Children's Privacy Notice | Terms and
Conditions |  Standard Advertising Terms and Conditions