Today we will be analyzing the different types of VPN connections how they can change the way we use the Internet
The best way to create something like that is through a VPN (virtual private network). A VPN allows a computer that is outside the corporate network can make connection with the internal network as if the computer is within the Office walls and access files, applications and printers. Some types require a remote pc that this a client application used to access the network, while other Vpns use Secure Sockets Layer (SSL) so that without client application. Some VPN solutions work with both ways.
At sole proprietorships, such as in an Office where 1 person only wants to have access to that one business computer, a VPN connection is not necessary. In such a case is an application like GoToMyPC or LogMeIn remote enough to the working user access to the computer. If a company needs multiple connections, a VPN is a better idea.
A IPSec VPN provides secure remote access via a client application on the computer and a VPN terminator which is located in the corporate network. In many cases it is also the VPN termination device for the corporate network firewall that protects against the internet, but it can also go to an individual solution. This device is configured to allow VPN connections that meet certain security criteria, such as a group name and a corresponding password. If the client is not configured properly, the VPN solution to connect.
If a client meets the requested configuration, then the client can be connected to the internal network, but there must still be logged in to get access to it somewhere. This is usually a user name and password for the VPN device itself or on the network through Microsoft Active Directory. In both cases, IPSec Vpns two forms of authentication before a remote system access is granted. Usually the required settings for clients can be shared via a file that the client can be imported. So users just need to type in a user name and password to gain access.
Some operating systems have a client application for IPSec VPN already on board. This allows Mac OS X with VPN solutions from Cisco and other manufacturers start immediately. Windows software more often leans on suppliers to IPSec. Many mobile devices have support for IPSec connectivity built in.
PPTP (point-to-Point Tunneling Protocol) Vpns are already being used since Microsoft built support for the protocol in Windows 95. In recent years, the fallen from grace because of secure connectivity issues with the protocol itself. Still some VPN devices support PPTP connections, with the Windows to do since Windows 95. Mac OS X and some smartphones offer also PPTP support. Although PPTP is still available as an option, do you there more sensible to use an IPSec or SSL VPN, since these are a lot safer.
Secure Socket Layer (SSL) Vpns came into fashion because they are known as “clientless” VPNs. This means that the remote computer need have no client preinstalled to stand up to connect to the corporate network. In most cases, set up an SSL VPN tunnel when a computer a browser window opens to an https connection to set up, as for example to https://vpn.mijnbedrijf.nl. If you do not have a DNS service provider decreases, this URL will just your ip address, so, for example, https://10.0.0.1.
In the browser, the user is prompted for a username and password. Once this is verified, the user is redirected to a Web page that shows an icon to connect to the VPN. When you click this, a little applet that will become the clientapp started on the user’s computer. This means that users do not need to install client in advance, such as IPSec Vpns. And they do not need to download the applet also to the SSL VPN to approach.
In some cases the client sufficient to in the consequence without writing a URL link. In other implementations the browser need to SSL VPN to function properly.
This form of VPN allows full network connectivity, just like IPSec, but it is more often easier to set up because you do not ‘ fat ‘ IPSec client need and no IPSec connection information. On the other hand is missing the two-stage authentication of IPSec, what may be a problem.