A virtual private network (VPN) is a network connection that has the appearance and many of the advantages of a dedicated link but is in fact implemented over a shared network. Using a technique called tunneling, data packets are transmitted across a public routed network such as the Internet. Generally, the private network data and protocol information are carried inside a wrapper so that along the way, they look like data to the routers, which remain unaware that the transmission is part of a private network. Only when the transmission reaches its destination is it unwrapped and sent to its intended recipient. This private "tunnel" simulates a point-to-point connection, and it allows network traffic from many sources to travel via separate tunnels across the same infrastructure.
More
Computerworld
QuickStudies
Tunneling allows network protocols to traverse incompatible infrastructures. It also enables traffic from many sources to be differentiated so that it can be directed to specific destinations and receive specific levels of service.
Tunneling can be initiated by a variety of network devices and software, such as an end user's laptop equipped with an analog PC modem card and VPN-enabled dial-up software. (Basic tunneling and security capabilities have been bundled into Windows since the release of Windows 95.)
Tunnels can also be started by a VPN-enabled extranet router on an enterprise branch or home office LAN, or by a VPN-enabled access concentrator at a network service provider's point of presence. A tunnel is ended by a tunnel terminator or switch on an enterprise network, or by a VPN gateway on a network service provider's network extranet router.
In addition, there are usually one or more security servers. Along with their conventional functions as firewalls and address translators, VPNs can provide for data encryption, authentication and authorization. Tunneling devices perform these functions by communicating with security servers. Such servers also usually provide information on bandwidth, tunnel end points and, in some cases, network policy information and service levels.
|
See additional Computerworld QuickStudies