Learn what VPNs are. Jungwoo defines VPNs and shows how to categorize them according to their topology.
- [Narrator] The ideal way of securely communicating between two different networks is a dedicated connection. A private line that provides such a connection is, however, too expensive. A cheaper alternative is using a public network, such as the Internet, to connect LANs, or Local Area Networks. VPNs, or Virtual Private Networks, use the Internet to connect the LANs. To ensure privacy using a public network, such as the Internet, a VPN encrypts all its data.
So a VPN is virtually as secure as a private network. There are three different uses of VPNs. The most common one is a remote access option, which allows a user to connect to a far away network from a client computer and have access to all the resources in the connected network. In fact, this makes the user machine virtually indistinguishable from those in the remote network. The name VPN largely stems from this common use of the technology.
The other usage scenario of VPN is site-to-site. In this case, two individual networks are connected via the VPN technology. Finally, the third usage of VPN is to host-to-host in which two distant computers are connected instead of two networks. So to summarize, VPN technologies are widespread and is playing an increasingly important role, especially in the context of newly emerging technologies like cloud computing.
A VPN is a great alternative to secure private networks.
- Network security concepts
- The basic functions of a firewall
- Intrusion detection and prevention systems
- Using network data to improve security
- Using log servers to collect data
- Collecting application data
- Collecting OS data
- Network forensics
- Network security visualization