90 likes | 104 Views
Virtual Private Network is one of the most useful technologies which help a lot in online activity. It provides a safe and secure way to protect privacy online and maintain data security.
E N D
VPN stands for Virtual Private Network • VPN creates a safe and encrypted connection over a less secure network, like, the internet. • VPN enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. • VPN is cost efficient and helps to connect business’s private network to a remote site or employee securely
2 types of VPN • Remote Access VPN: • This VPN allows users to connect to a private network and access its service and resources remotely. • This type of VPN is useful for both business users as well as home users. • Site-to-Site VPN: • Site-to-site VPN is mostly useful for corporates. • Companies with multiple office branches in different locations use this VPN to connect the network of one office location to the other. • In this type of VPN one router acts as a VPN client while the other as a VPN server.
Internet Protocol Security (IPSec): • Internet Protocol Security enables secure Internet communication across an IP network. • It authenticates the session and encrypts each data packet during the connection. • Transport mode and Tunnelling mode are the 2 modes of operation for IPSec. • Point-to-Point Tunnelling Protocol (PPTP): • Point-to-Point Tunnelling Protocol creates a tunnel and encapsulates the data packet. • It uses a Point-to-Point Protocol (PPP) to encrypt the data between the connections. • This is one of the most widely used VPN protocol.
Layer 2 Tunnelling Protocol (L2TP): • L2TP is combined with another VPN security protocol like IPSec to create a highly secure VPN connection. • L2TP creates a tunnel between two L2TP connection points. While IPSec protocol encrypts the data and handles secure communication between the tunnels. • Secure Sockets Layer (SSL) & Transport Layer Security (TLS): • SSL and TLS create a VPN connection where the web browser acts as the client and user access is restricted to specific applications instead of the entire network. • SSL and TLS protocol are most commonly used by online shopping websites and service providers.
Secure Shell (SSH): • SSH creates the VPN tunnel through which data transfer happens. • It also ensures that the tunnel is encrypted. • OpenVPN • OpenVPN is an open source VPN that is useful for creating Point-to-Point and Site-to-Site connections. • It uses a custom security protocol based on SSL and TLS protocol.
VoIP VPN combines Voice over IP and Virtual Private Network technologies to offer a method for delivering secure voice. • VoIP VPN creates a secure, encrypted tunnel over the Internet through which all the VoIP Traffic passes through. • It assigns a new address based on the selected VPN server, therefore, allowing one to access VoIP Service even through VoIP blockage.
Cost Reduction • Prevents Throttling • Ensures Security • Bypasses blockages
WCEGA Tower, 21 Bukit Batok Crescent, Unit 15- 84, Singapore 658065, + 65 31586979 For General Enquiries: info@inaani.com For Business Partners: sales@inaani.com For Wholesale/Retail Operations: sales@inaani.com Follow us on https://www.inaani.com