🖌️
Networking
  • Introduction
  • Networking and Topology
    • Networking
    • Topology
    • Types of Topologies
  • Firewall
    • Firewall
    • Types of Firewall
    • Stateful vs Stateless Firewalls
    • Content Filtering
    • Signature Identification
    • IDS/IPS
  • MAC Address
    • MAC Address
  • OSI Model
    • OSI Model
    • Layers of OSI Model
  • IP Address
    • IP Address
    • Subnet Mask
    • IP Classes and Ranges
  • Subnetting
    • Subnetting
  • IP Addressing Methods
    • IP Addressing Methods
  • TCP/IP Protocol Suites
    • TCP/IP Protocol Suites
  • Ports
    • Ports
  • Networking Services
    • Networking Services
  • Routing Protocols
    • Routing Protocols
  • WAN Technologies
    • WAN Technologies
  • Internet Access Technologies
    • Internet Access Technologies
  • Network Types
    • Network Types
  • Remote Access Protocols and Services
    • Remote Access Protocols and Services
    • VPN (Virtual Private Network)
    • Types of VPN connections
  • Authentication Protocols
    • Authentication Protocols
  • Cloud and Virtualization
    • Cloud and Virtualization
  • Cloud Computing
    • Cloud Computing
    • Type of Cloud Computing
  • VLAN, Intranet and Extranet
    • VLAN, Intranet and Extranet
  • Optimization and Fault Tolerance
    • Optimization and Fault Tolerance
    • Backup Services
    • Disaster Recovery
  • Security Protocols
    • Security Protocols
    • Types of Protection
  • SOHO Routers
    • SOHO Routers
  • Network Utilities
    • Network Utilities
  • Networking Issues
    • Networking Issues
  • Troubleshooting Strategy
    • Troubleshooting Strategy
Powered by GitBook
On this page

Was this helpful?

  1. Remote Access Protocols and Services

VPN (Virtual Private Network)

VPN (Virtual Private Network)

VPN (Virtual Private Network) -

A private communications network that uses a public network (such as internet) to establish a remote connection.

Encrypts data when sending and decrypts data when receiving.

Provides a dedicated link between two points over the internet.

VPN Concentrator -

The VPN is created and managed by using a VPN Concentrator.

VPN concentrator is a device that creates the VPN connections and manages the delivery of the messages between the VPN computers and devices.

Authenticate users, encrypts the data and assigns tunnel/ IP addresses to users.

Not always needed to manage and create VPNs. Mostly used in organizations that are going to use a lot of VPN connections and they need a decide to handle the heavy traffic that VPNs create.

If an organization is only going to use small amount of VPN connections then they can just use the VPN software that is built into their router or firewall rather than using a VPN concentrator.

PreviousRemote Access Protocols and ServicesNextTypes of VPN connections

Last updated 3 years ago

Was this helpful?