What is an VPN?

A VPN when used in the context of computer networks is a Virtual Private Network. VPNs are used to provide additional security and privacy for users by establishing an encrypted connection, or tunnel, between a VPN client and a VPN server.

VPN Types and How Does a VPN Work

Remote Access VPN

What is an VPN? 1

A Remote Access VPN is one that allows client systems such as a personal laptop or desktop to connect to a VPN server such as one in a corporate office or one in a datacenter.

Corporate VPN: Remote access VPNs are most commonly used in business and enterprise environments by providing client systems a secure method of accessing a company’s internal network. By connecting to a corporate VPN, a user would establish an encrypted connection into the corporate network and appear on the network as if it were physically plugged into the corporate network itself complete with a corporate network’s internal IP address. As a result, this allows companies to secure access to its internal files from outside networks, but still provide employees a method of remotely accessing them.

Personal VPN: Due to the recent increase in security and privacy concerns, personal VPNs have also become a popular means of securing personal systems when connecting to public networks. Personal VPNs create an encrypted connection between a client system and a VPN provider’s server ensuring that all data transferred in and out of the client system is completely secured. The VPN provider then acts as a proxy for the client system to access the internet.

Personal VPNs are a good way for news reporters, social activists, whistleblowers, and others to hide their location as well as bypass any sort of governmental internet access restrictions. Many also use personal VPNs to access geo-restricted content as well as prevent copyright holders from discovering the identities of users illegally downloading copyrighted content.

Site-to-Site

Site-to-Site VPNs are generally used in corporate environments and allow multiple corporate offices to appear as if they were all connected to the same network despite being in separate geographical locations. These VPNs generally require setting up corporate routers that support this type of functionality.

Common VPN Protocols

PPTP

PPTP, or Point-to-Point Tunneling Protocol, is one of the oldest VPN protocols still in use today. PPTP was first implemented in Windows 95 and has been built into every single Windows Operating System since. PPTP uses the MS-CHAP-v1/v2 encryption protocol, which is known to be insecure however, because the encryption is light, it’s well suited for transferring large amounts of data that don’t necessarily require a high level of security such as streaming a regionally blocked video while travelling.

L2TP/IPSec

L2TP, or Layer 2 Tunneling Protocol, was designed as an upgrade to PPTP which we discussed previously. L2TP is a tunneling protocol by itself, so it doesn’t provide any encryption whatsoever, but it can provide security when combined with IPsec, or Internet Protocol Security.

L2TP/IPSec is more secure than PPTP, but is significantly slower due to its more powerful security capability.

Open VPN

The newest and most secure VPN protocol is OpenVPN, which uses the OpenSSL encryption library. OpenVPN is fast, it’s free, and it uses strong encryption algorithms to protect data being transmitted.

This post was last modified on February 25, 2020 7:23 am

Sam Chen

Sam is a Southern California native and an avid tool and gear enthusiast. When he's not working his day job, he enjoys spending his time working on remodeling projects, cars, and the outdoors. Follow him on Twitter @realsamchen

Share
Published by
Sam Chen

Recent Posts

Tesla Supercharger

Tesla, the leading electric vehicle (EV) manufacturer, has revolutionized the EV industry with its innovative…

July 22, 2023

RAID

RAID in computers is an acronym for Redundant Array of Independent Disks. While its name…

March 17, 2020

NCMA

NCMA, when used in the context of batteries, stands for Nickel, Cobalt, Manganese and Aluminum…

March 12, 2020

PuTTY

PuTTY is a free and open source terminal emulator application developed by Simon Tatham. It's…

March 8, 2020

Tennessee Whiskey

Jack Daniel's 150th Anniversary Tennessee Whiskey | Source: Jack Daniel's Tennessee Whiskey is a specific…

March 5, 2020

Apple

Apple Logo Apple is an American technology company based in Cupertino, California. Founded by Steve…

March 4, 2020