Blog Image

Virtual Private Netwok  

Hi Guys, in this blog I am going to explain what is VPN? what is the reason to become more popular VPN services in today's world. So I will explain how VPN works and what security it is going to provide to us.


First to understand what is VPN? we need to know need of VPN, so let?s take public network and what are the problem with public networks and how it works.

Normally, when you connect to the internet you first connect to your Internet Service Provider (ISP), and then connects you to any websites (or other internet resources) that you wish to visit. All your internet traffic will passes through your ISP?s servers, and we can viewed by IP address.


The major problems with public networks, If Employ is remotely working and want to connect company servers through public networks, it may damage company secure information and Hackers, Government and Firewalls there may see our data using our IP address or there may track our activities. This is the major security bridge when it comes to public networks.

For this reason, VPN?s are hugely popular in corporate world, when using VPN, you connect to a server run by your VPN Provider (VPN server) via an encrypted connection (sometimes referred to as a VPN tunnel). That means all your data travelling between your computer and VPN server is encrypted so that you and the VPN server can only see your data.

The key to a VPN is that it lends you a temporary IP address and hiders your true IP address from every website you connect with.

If we connect VPN

  1.  ISP cannot see your data bcz it is encrypted
  2. ISP cannot know which websites you visited because all internet activities routed through the VPN server. So your ISP server can only see that you are connected to the VPN server.
some of the major advantages of using VPN services are

It is Safe to use public WIFI hotspots: Because the internet connection between your device and the VPN server is Encrypted. Even if a hacker somehow manages to intercept your data, the data is Safe because it is encrypted.

Access Geo-Blocked Websites: Whether you are an American trying to access your Netflix account while travelling out of the country, you will be able to access these region-restricted services if you connect to a VPN located in the USA.

How Does a VPN work?

 For example, when you browse the website if you connected to a VPN (it hides our IP and it generates temporary IP address based and our VPN server network it means our VPN server in 10.10.0.0 network), your computer contacts the website through the encrypted VPN connection. First request goes to VPN server, and VPN forwards to website, that website will think your connection as coming from within the VPN server located area (if it is located in Mumbai then website will think the request is coming from Mumbai) and it will hide your personal information completely.

Many security protocols have developed as VPN?s to provide different layers of security, each offering different levels of security and features, some common protocols are:

IP Security (IPSec): IPSec is often used to secure Internet Communications and it will operate in two modes,

Transport mode: it only encrypts the data packet message itself.

Tunnelling mode: it encrypts the entire data packet.

Simply a ?tunnel ? is a link between two locations through some other material(material means encryption process).

Layer 2 Tunnelling Protocol (L2TP): The L2TP and IPSec protocols combine their best individual features to create a highly secure VPN Client.

L2TP isn?t capable of encryption, it just generates the tunnel and IPSec will take care off encrypting the data packets. It ensures all the packets have arrived to the channel are not.

 Secure Socket Layer (SSL) and Transport Layer Security (TLS): SSL and TLS are used extensively in the security of online retailers and service providers. These protocols operate using a Handshake method.

As IBM explains, a Http-based SSL connection is always initiated by the client using a URL starting with https:// instead of http://, at the beginning of an SSL session.

Point-to-Point Tunnelling Protocol (PPTP):  It doesn?t do encryption, it simply tunnels and encapsulates the data packet.

Secure Shell (SSH): Secure Shell provides strong authentication and secure encrypted data communications between two computes connecting over an insecure network such as the Internet. SSH is widely used by network administrators for managing systems and applications remotely, allowing them to log into another computer over a network, execute commands and move files from one computer to another computer.

I hope this blog will help you to understand some basic things related to VPN services.


















tags: vpn

Attachments

About author

User Image
balu443

Well ,This is Balu having experience in web/mobile application development, currently working as Software Engineer in one of the Product based company and very passionate technologies and always an explorer and learner in new technologies.

2

-Comments

Be the first person to write a comment for this Blog
  • author image
    by:
      chowdaka5
      08-6-2018 03:39:34 PM

    Thanks for your support please keep this it may help us

  • author image
    by:
      vijaybabu
      21-5-2018 02:26:28 PM

    Hay Balu, you did such a nice hard work for exploring your knowledge to all of us. i should thanQ from bottom of my heart.....stay healthy nd keep it up

Load More

No More Comments

Leave a Comment

Your comment has been posted and will appear soon.