A Crash into VPN

来源:互联网 发布:遗传算法简单实例 编辑:程序博客网 时间:2024/05/17 08:28
VPN has been a major part in our lives, especially in our preparation for studying abroad in China. But how does it work? Why can't it be detect and what is its true function? These questions are explained in today's class. VPN has been a useful tool for people to communicate with each other in a private, secure and efficient way. Because it is virtual, the connection between two sites is much more secure than those physical one. And the virtual net is build on to a server. With that server, a government's firewall cannot recognize the true intension of a request via this VPN. At the same level, a VPN can be used as a insurance for the private conversation's security. There are several types of VPN: 1) Site-to-site VPN; 2) Remote Access VPN. A site-to-site VPN requires client is used for individuals to connect with certain website they would like, for instance Chinese people connect to Facebook. And a remote access VPN is used when companies need to connect inside itself or to another company. This technique accelerates the communication between two different entities.
At the same time, about "Tunneling," it is a kind of protocol that helps to encrypt as well as seal the information of a certain package, which would be helpful to the security issues within a VPN. The tunneling protocol includes L2TP, PPTP, and IPSec. All these protocols are helpful to keep the information safe. NAS(Network Access Server), Internet, Client software are needed for a particular remote access VPN. NAS, VPN Router, and Internet are needed for a site-to-site software.

Reference:
PacketiX VPN 3.0. Digital image. PacketiX VPN 3.0. SBaiCL, 7 Sept. 2012. Web. 4 Nov. 2016.
请使用手机"扫一扫"x
0 0
原创粉丝点击