Introduction to VPN technology and commonly used VPN networking methods in enterprises

Introduction to VPN technology and commonly used VPN networking methods in enterprises

VPN (Virtual Private Network) refers to the use of public networks, mainly the Internet, to establish a private network to transmit private data.

What does this mean? We can explain it from some needs, because all technologies are created to meet certain needs. Imagine that the company has such a system, such as OA (Office Automation) system, financial system, which can only be accessed when you are in the company, and cannot be accessed once you leave the company. We call these systems internal systems, and their network environment is the internal network. Because these systems are very important to ensure sufficient security, these systems must not be connected to the Internet. Once connected to the Internet environment, they may be attacked, which is very dangerous.

So what should we do if we want to access these systems when we are not at work? In theory, we can use a dedicated line, which is equivalent to a long enough network cable, to connect to the company's internal network to access them, but this method is of course unrealistic. The reality is that we can use the Internet, because the Internet has been built there, so VPN technology was born. It creates a secure private connection on the Internet public network. The public network is unaware of the existence of VPN, and there is no need to make any changes to the public network. VPN only uses the data transmission capacity of the public network.

[[279299]]

According to the different network access methods, there are two main VPN access methods commonly used in enterprises, namely Site to Site connection method and Remote Access connection method. Site to Site is mainly used for connections between important sites of a company. For example, if a company has branches in other places, the employees of these branches will of course also need to access the internal system of the company headquarters. Site to Site VPN technology is transparent to end users, that is, the branch cannot feel the existence of VPN technology, because this method has established a connection through the VPN equipment of each site, so it will feel that the sites visited by each other are located in the same intranet. Site to Site VPN connection technology can only meet the connection between company sites, that is, users must be inside the company to use this technology to connect to other sites.

If the user is away on a business trip, site-to-site VPN connection technology is not applicable. In this case, remote access VPN connection technology is needed. Remote access VPN generally requires the installation of a VPN client on the client computer in advance. The client varies depending on the specific implementation technology used. The most convenient way is to dial to the company's VPN gateway device by entering the VPN account and password through the IE browser. If the dial-up is successful, the client is virtually connected to the company's VPN gateway through a network cable, and then obtains an IP address to access the company's internal server.


<<:  How many layers are in the TCP/IP protocol stack that you are learning? The standard answers in textbooks are changing

>>:  Worth learning! 10 good habits of network administrators

Recommend

Wi-Fi 6 testing completes, global deployment to begin in 2021

The Wireless Broadband Alliance (WBA) has announc...

Demand is holding back technology. WiFi6 is not yet popular. 6E is coming.

As 5G technology develops rapidly, Wi-Fi technolo...

Sina Weibo Hou Qinglong: Weibo LNMP architecture in the new era

【51CTO.com original article】Just last week, the W...

TCP and UDP, 123 things you need to know (TCP)

Preface As a network operation and maintenance pe...

Huawei releases next-generation CloudLink video conferencing solution

[Beijing, China, September 6, 2019] Huawei held a...

Basic Principles for Campus Network Product Selection

I am Xia Jie, a lecturer at 51CTO Academy. On the...

The road to network modernization starts now

Today, as more businesses adopt open office plans...

See if you can handle this kind of interview. How does TCP transmit reliably?

Preface Hello everyone, I am Amazing. It is the g...

"Online Documents" crashes in real time?

[[420464]] There is a magical phenomenon in this ...

The entire network discloses IP locations, and your location is exposed

Author | Lu Yao Reviewer | Yun Zhao Recently, IP ...