This website uses cookies to ensure you have the best experience. Learn more

Vpn For Information Technology Essay

3446 words - 14 pages

How Virtual Private Networks Work
Document ID: 14106

Introduction Prerequisites Requirements Components Used Conventions Background Information What Makes a VPN? Analogy: Each LAN Is an IsLANd VPN Technologies VPN Products Related Information

This document covers the fundamentals of VPNs, such as basic VPN components, technologies, tunneling, and VPN security.

There are no specific requirements for this document.

Components Used
This document is not restricted to specific software and hardware versions.

Refer to Cisco Technical Tips Conventions for more information on document conventions.

Background ...view middle of the document...

As the popularity of the Internet has grown, businesses have turned to it as a means of extending their own networks. First came intranets, which are sites designed for use only by company employees. Now, many companies create their own Virtual Private Networks (VPNs) to accommodate the needs of remote employees and distant offices.

A typical VPN might have a main local−area network (LAN) at the corporate headquarters of a company, other LANs at remote offices or facilities, and individual users that connect from out in the field. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real−world connection, such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

What Makes a VPN?
There are two common types of VPNs. • Remote−AccessAlso called a Virtual Private Dial−up Network (VPDN), this is a user−to−LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote−access VPN provides some form of Internet dial−up account to their users using an Internet service provider (ISP). The telecommuters can then dial a 1−800 number to reach the Internet and use their VPN client software to access the corporate network. A good example of a company that needs a remote−access VPN would be a large firm with hundreds of sales people in the field. Remote−access VPNs permit secure, encrypted connections between a company's private network and remote users through a third−party service provider. • Site−to−SiteThrough the use of dedicated equipment and large−scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Each site needs only a local connection to the same public network, thereby saving money on long private leased−lines. Site−to−site VPNs can be further categorized into intranets or extranets. A site−to−site VPN built between offices of the same company is said to be an intranet VPN, while a VPN built to connect the company to its partner or customer is referred to as an extranet VPN. A well−designed VPN can greatly benefit a company. For example, it can:

• Extend geographic connectivity • Reduce operational costs versus traditional WANs • Reduce transit times and traveling costs for remote users • Improve productivity • Simplify network topology • Provide global networking opportunities • Provide telecommuter support • Provide faster Return On Investment (ROI) than traditional WAN What features are needed in a well−designed VPN? It should incorporate these items: • Security • Reliability • Scalability • Network Management • Policy Management

Analogy: Each LAN Is an IsLANd
Imagine that you live on an island in a huge ocean. There are thousands of other islands all around you, some very...

Other Papers Like Vpn For Information Technology

Virtual Private Network Essay

2502 words - 11 pages you have a valid username and password, and your identity determines which parts of the extranet you can view. Extranets are becoming a popular means for business partners to exchange information. Other options for using a VPN include such things as using dedicated private leased lines. Due to the high cost of dedicated lines, however, VPNs have become an attractive cost-effective solution. [pic] How do VPNs Work? ➢ VPNs consist

Vpn Securtiy Essay

2899 words - 12 pages also responsible for maintaining and setting up the tunnel connections in the VPN. A VPN client is any device that is initiating a connection to the VPN server; this software works as the tunnel interface to establish the connection to the VPN. With modern technology this can be anything from a computer, to a tablet to a smart phone. (Technet, "Components of virtual private networks", 2005) A firewall is another must as it is the protective

Network Design Final Project Template

5384 words - 22 pages business world not utilizing all the advances in technology may cause a business to lag behind. There are many advances in computers and computer networks. Companies need to make the most of these advancements to help more the business forward. One way for a company to do this is the use of a VPN. A VPN (Virtual Private Network) is a private network that uses a public network to securely communicate between two or more computers. A VPN is

Unit 8 Nt 2580

907 words - 4 pages , computer-level authentication using computer certificates or a pre-shared key. IPsec tunnel mode When Internet Protocol security (IPsec) is used in tunnel mode, IPsec itself provides encapsulation for IP traffic only. The primary reason for using IPsec tunnel mode is interoperability with other routers, gateways, or end systems that do not support L2TP over IPsec or PPTP VPN tunneling. Interoperability information is provided at the Virtual

Remote Network Access Technology

1073 words - 5 pages connection through desktop, notebook, or handheld computer modem over regular telephone lines. These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office. VPN REMOTE ACCESS TECHNOLOGY

Whatever Works

956 words - 4 pages maximum of six months and are renewable 6. Dial-up connections will have only the same access as internet users. 7. No devices or software may be installed that allows remote access to the Richmond network such as modems, wireless access points, or VPN servers. All remote access will be provided centrally by Technology Resources. 3.2 Requirements 1. Secure remote access must be strictly controlled. Control will be enforced via password

Implement a Vpn Tunnel Between a Microsoft Server and Microsoft Client

653 words - 3 pages Nickolas Wiebelhaus Lab #7 Worksheet 1. What is the name of the Windows Server 2008 role you need to deploy to provide remote access services to clients? Explain why this service is important in a corporate environment. There are two different things that I checked off for configuring the VPN but the role that actually allows the VPN to work is the Routing and Remote Access Services role. 2. What was the IP host range that was

It Infrastructure Security

1162 words - 5 pages Unit 4 Assignment 1: Create a VPN Connectivity Troubleshooting Checklist 1. Find out who is affected The first step in troubleshooting any VPN problem is to determine who is affected by it. That information can go a long way toward helping you figure out where to start looking for the problem. For example, if everyone in the company is having problems, you might look for a hardware failure on your VPN server, an incorrect firewall rule

Telecomunication Ifsm 310 Project 2

996 words - 4 pages have agreed to implement internal network solution which will improve business operations and meet system requirements. The purpose of this paper is to define technologies which will help UMUC to solve current problems and will provide company with reliable and secure telecommunications network. Proposed Technology Solution To resolve telecommunications network issues UMUC executive team has decided to use a Virtual Private Network (VPN

Access Control

1625 words - 7 pages control policy? 2) What are the access methods (such as LAN, wireless, or VPN) I want to protect? 3) How will this integrate with my existing infrastructure? Once you answer these questions, you can begin to gather test lab resources, such as servers (for policy definition points), laptops or desktops (for network access requestors), and switches, access points, and VPN servers (for policy enforcement points). Getting Started with Network Access

Building on Prior Success

1360 words - 6 pages proposal and has indicated that she would like to make additional changes to the network. She would like to add four servers to the network so employees can share files. She would also like to allow VPN access for her employees so they can work remotely. The president would like to complete these objectives while keeping the up-front costs to a minimum. In determining the correct Network Operating System (NOS) depends on the needs of the agency

Related Essays

How And For What Purposes Do Companies Use Information Technology In Supply Chain Management?”

1265 words - 6 pages utilisation of information technology (IT), in turn, is considered an imperative requirement for managing these networks, and has been associated with significant supply chain efficiency improvements . Although the importance of IT for efficient SCM is widely acknowledged, empirical research assessing how IT is in practice used for the purposes of SCM is narrow. More specifically, majority of the prior research has focused either on modeling the

Information Technology (It) For Improving Banking Activities: A Study On International Finance Investment And Commerce Bank Ltd

1395 words - 6 pages PROJECT PAPER ON Information Technology (IT) for improving Banking Activities:- A study on International Finance Investment and Commerce Bank LTD Thesis for the partial fulfillment of BBA program of BBA (I) in Management Studies PROJECT PAPER ON Information Technology (IT) for improving Banking Activities:- A study on International Finance Investment and Commerce Bank LTD Under supervision ------------------------- Prof. Md. Mosharraf

Mth/221 Discrete Math For Information Technology Week 4

1144 words - 5 pages of G induced by the set of vertices U _ {b, c, d, f, i, j}. e) For the graph G, let the edge e _ {c, f }. Draw the subgraph G − e. Figure 11.27 Problem 6: Find all (loop-free) nonisomorphic undirected graphs with four vertices. How many of these graphs are connected? Exercise 11.3 Problem 5: Figure 11.42 Let G1 _ (V1, E1) and G2 _ (V2, E2) be the loop-free undirected connected graphs in Fig. 11.42. a) Determine |V1

Understanding Vpn's Essay

3780 words - 16 pages from outside of the data’s native network has become a requirement in today’s society. Although there is more than one way to access remote data, the most common technology used is a VPN (Virtual Private Network). A virtual private network is a way to establish a private network connection over a public network (Resource 1). A virtual private network takes advantage of the internet as a backbone for private network connections between remote