3.1.4 – 3.1.5 – Identify the technologies required to provide a VPN.

3.1.4 – Identify the technologies required to provide a VPN.

What is a VPN (Virtual Private Network)?

“A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely.”

What is required to have a VPN?

  • A LAN that is connected to the internet.
  • One computer outside of the LAN that is also connected to the internet.
  • VPN client and server running on the lone machine and the original LAN Internet connection
  • Encryption protocol IPSec or SSL

VPN technologies

Two major technologies when working with VPN’s are

  • Encryption
  • Tunneling

When you connect to the internet with a VPN, the VPN creates a connection between you and the internet that surrounds your internet data like a tunnel, encrypting the data packets your device sends.

“While technically created by a VPN, the tunnel on its own can’t be considered private unless it’s accompanied with encryption strong enough to prevent governments or ISPs from intercepting and reading your internet activity.

The level of encryption the VPN tunnel has depends on the type of tunneling protocol used to encapsulate and encrypt the data going to and from your device and the internet.”

Sourced from Tech Radar

There are many types of VPN tunneling protocols that offer varying levels of security and other features.

Two of them are

  • SSL (or the newer TLS)
  • IPSec

3.1.5 Evaluate the use of a VPN

With everything there are both advantages and disadvantages

Advantages of a VPN

  • VPNs allow you to work anywhere remotely – telecommuting
  • Bypass Geoblocks
  • Keep you anonymous on the Internet
  • Avoid Online Price Discrimination

Disadvantages of a VPN

  • Is the telecommuter expected to worked more hours as they are “at home” all day
  • Is everyone being anonymous on the internet a good thing? Hackers, Illegal Trade etc
  • The course expects you to evaluate so evidence of both the pros and cons as well as offering a fair judgment based on both sides of the argument.