Skip to main content

What is VPN ?

 

In any organization that uses the global internet as both intra & inter-organization, but required privacy in their communication.

To achieve privacy, an organization can use three strategies:

                ·        Private Networks

                ·        Hybrid Networks

                ·        VPN (Virtual Private Network)

 Private Networks:

     An organization that needs privacy when routing information inside the organization can use private networks. A small organization with one single site can use an isolated LAN, people inside the organization can send data to one another that totally remain inside the organization secure from outsiders.

     A large organization with several sites can create a private internet. The LAN at different sites can be connected to each other using routers and leased lines.

Hybrid Networks: 

    Today most organizations need to have privacy in intra-organization data exchange, but at the same time, they need to be connected to the global internet for data exchange with other organizations. A hybrid network allows an organization to have its own private network and at the same time, access to the global internet. Intra-organization data is routed through the private internet, inter-organization data is routed through the global internet.

Virtual Private Network:

     Both private and hybrid networks have a major drawback – COST. Private wide area network expensive. One solution is to use the global internet for both private and public communication that technology called Virtual Private Network (VPN), VPN allows organizations to use the global internet for both purposes.

     VPN creates a network that is private but virtual. It is private because it guarantees privacy inside the organization. It is virtual because it does not use real private WAN, network is physically public but virtually private. VPN provides remote access to private networks across public connections. That is using the internet client can dial into an Internet Service Provider (ISP) and connect to your private networks

 

Comments

Popular posts from this blog

Datto Backup Process

                                                    Backup Process Local Backup The protected machine generates data that needs to be backed up.   The Datto appliance sends a backup request to the agent software installed on the protected machine.   The agent software opens the network transfer protocol and initiates the VSS snapshot on the protected machine.   The backup data is transferred over the network to the Datto and written to the live dataset.   On the Datto appliance, ZFS takes a point-in-time snapshot of the live dataset and integrates it into the backup chain.         Roundtrip:-                Roundtrip drives are external hard drives provided b y Datto to expedite the transfer of large data sets to the Datt...

Beyond the Basics: Understanding the 3-2-1 Backup Rule

In our increasingly digital world, data is king. From cherished family photos and important financial documents to critical business records, our lives and livelihoods depend on the availability and integrity of our digital information. But what happens when disaster strikes? A hard drive crashes, a laptop is stolen, a ransomware attack locks down your files, or a natural disaster renders your primary systems unusable? ​That's where the 3-2-1 backup rule comes in. It's a simple, elegant, and incredibly effective strategy for data protection that every individual and organization should adopt. Forget complex jargon – let's break down this fundamental principle of digital resilience. ​What is the 3-2-1 Backup Rule? ​The 3-2-1 rule is a widely recommended guideline for ensuring your data is safe and recoverable in almost any scenario. It's built on three core tenets: ​ 1. 3 Copies of Your Data: This is your foundational layer of protection. You should al...

Windows Stuck on "Preparing to configure Windows"

           Preparing to configure Windows. Do not turn off your computer.   When server got stuck from long time on “Preparing to configure Windows Do not turn off your computer” . Don’t powering it off because it may be bad effect on your OS. Here have fix to get rid out of this.                                                                                                   Steps to Fix: Logged into another server on the same domain. Open Services console Right Click on Service (Local), then click on “Connect to...