Anonymous asked in Computers & InternetSecurity · 1 decade ago

How is VPN configured? (Knowhow)?

How can I configure virtual private network?

6 Answers

  • 1 decade ago
    Favorite Answer

    1) Virtual Private Networks

    Virtual private networks (VPN) are a secure way for businesses and companies to communicate via the Internet. They assure the tightest of security and are not open to traffic from the public. Remote users and multiple sites of users can be connected through a direct private pathway. The installation of a VPN alters the need for a WAN (wide area network), simplifies the companies' network needs, provides extended telecommute opportunities and opens up the possibility for global networking. Building a secure VPN requires reliability, scalability and management of the network and policies designed to run the network. VPN's can be managed by the company or contracted to a VPN provider.

    2) The Language Of VPNs

    Virtual private networks use a special vocabulary that describes its components. Nodes are the points at which connections or lines intersect. Nodes generally have a server or router to monitor traffic. Network access servers (NAS) allow entry into and out of the network. Protocols are standards that control a connection. A tunneling protocol describes the act of encapsulating one protocol within a second protocol. This provides secure pathways through questionable networks and makes a VPN work. Service-level agreements define what a VPN provider, also called an enterprise service provider or ESP, will supply the customer with. VPNs are usually more complex than just a point-to-point connection. Their topology can be very complex, and it is important that the provider outline how delivery of a customer's traffic will be achieved.

    3) Remote-Access VPN

    VPNs come in two common types: remote-access and site-to-site access. A remote-access VPN is also called a virtual private dial-up network. This type of VPN is used by companies with a large number of remote users that need to call in to go to work. Since they are calling from all over the nation or from international locations, their connections need to be secure. Software that is loaded onto their computers allows them to use a toll-free number that connects them to their network access server, then verifies them and allows them into their corporate network. Encryption is often used to secure the connection further.

    4) Site-To-Site VPN's

    Site-to-site connections allude to multiple fixed locations that need to be connected securely. Sometimes, companies wish to connect to other companies due to contractual obligations or shared projects. This VPN is called a site-to-site extranet. Site-to-site VPNs for a company's internal connections are referred to as an intranet. Neither are open to the public and both require permission, user names and passwords to enter.

  • Anonymous
    1 decade ago


    Clientless SSL VPN products break web browser domain-based security models:

    US-CERT, a government organization

    Proof of concept & work arounds for a yet to be fixed vulnerability.

  • Anonymous
    1 decade ago

    Not sure what kind of a VPN you have. This site has info on connecting PPTP and OpenVPN. If you provide some more info I can help you in more detail.

  • Anonymous
    7 years ago

    When i recommend making use of to unblock web sites. I am using their services for more than 2 years with no issues.

  • How do you think about the answers? You can sign in to vote the answer.
  • Anonymous
    7 years ago

    When i endorse employing to unblock web-sites. I am using their services for more than 3 years without difficulties.

  • 1 decade ago

    Well, don't use it .. coz am having a problem with it .. Virus affected one

Still have questions? Get your answers by asking now.