Minggu, 23 Agustus 2015
Function, How It Works and What VPN
VPN stands for Virtual Private Network, which is a private connection over a public network or the Internet, virtual network means the network must be characterized as virtual .. Private namely private network is formed in which not everyone can access it. The data is sent encrypted so that it remains confidential even though through the public network. If using a VPN us as if to create a network within a network or so-called tunnel. VPN using one of the three existing tunneling technology, namely: PPTP, L2TP and latest standards, Internet Protocol Security (commonly abbreviated as IPSec). VPN is a combination of tunneling and encryption technology.
The workings of VPN (PPTP protocol) is as follows:
VPN requires a server that serves as a liaison between the PC, the VPN server can be a computer with a VPN server or a router.
To start a connection, a computer with VPN Client applications contact the VPN Server, VPN server then verifies the username and password and if successful then the VPN Server provide a new IP address on the client computer and then a connection / tunnel will be formed.
Furthermore, the client computer can be used to access a variety of resources (computer or LAN) is behind the VPN Server instance to transfer data, ngeprint document, browsing with a given VPN gateway server, perform remote desktop and so forth.
Is the VPN function?VPN technology provides three main functions for its users. The main functions are as follows:
1. Confidentiality (Confidentiality)VPN technology to have a working system to encrypt all data that passes through it. Given this encryption technology, then you become more awake confidentiality. Even if there are those who can tap the data you are passing, it is unlikely they could read it easily because it has been encrypted. By applying this encryption system, no one person can access and read the contents of your data network with ease.
2. Data Integrity (Integrity Data)When passing through the Internet, your data is actually to walk very far across different countries. While on the road, anything can happen to it. Whether it is lost, damaged, even the contents manipulated by people for fun. VPN has technology that can maintain the integrity of the data you send in order to get to the goal without a disability, lost, damaged, or manipulated by others.
3. Origin Authentication (Authentication Source)VPN technology has the ability to authenticate the sender of the data sources that will be received. VPN will conduct an examination of all incoming data and retrieve information source data. Then address this data source will be approved if the authentication process is successful. Thus, the VPN ensures that all data sent and received by you from sources that should be. No data was falsified or transmitted by other parties.
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar