Wednesday, May 30, 2012

Site to Site VPN, Remote VPN

Remote-access VPN

A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers. An example of a company that needs a remote-access VPN is a large firm with hundreds of salespeople in the field. Another name for this type of VPN is virtual private dial-up network (VPDN), acknowledging that in its earliest form, a remote-access VPN required dialing in to a server using an analog telephone system.

There are two components required in a remote-access VPN. The first is a network access server (NAS, usually pronounced "nazz" conversationally), also called a media gateway or a remote-access server (RAS). (Note: IT professionals also use NAS to mean network-attached storage.) A NAS might be a dedicated server, or it might be one of multiple software applications running on a shared server. It's a NAS that a user connects to from the Internet in order to use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN. To authenticate the user's credentials, the NAS uses either its own authentication process or a separate authentication server running on the network.

Site-to-site VPN

A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN extends the company's network, making computer resources from one location available to employees at other locations. An example of a company that needs a site-to-site VPN is a growing corporation with dozens of branch offices around the world.
There are two types of site-to-site VPNs:
  • Intranet-based -- If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN.
  • Extranet-based -- When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets.
Even though the purpose of a site-to-site VPN is different from that of a remote-access VPN, it could use some of the same software and equipment. Ideally, though, a site-to-site VPN should eliminate the need for each computer to run VPN client software as if it were on a remote-access VPN. Dedicated VPN client equipment, described later in this article, can accomplish this goal in a site-to-site VPN.
Now that you know the two types of VPNs, let's look at how your data is kept secure as it travels across a VPN.

10 comments:

  1. This post is very interesting and easy to understand. I have learn a lot about how Site to Site VPN, Remote VPN can be used as a measure for security architecture from your post. The explanation u gave on Site VPN, Remote VPN are quite less. Hence, I would suggest that maybe you can give more examples on how Site VPN, Remote VPN works and how it can help us. You can also elaborate more on the key points of Site VPN, Remote VPN so that readers like myself will be able to understand more. Maybe you can add pictures, videos, or your voice chat to let readers like myself have a even better and clearer knowledge on what Site VPN, Remote VPN are all about.

    ReplyDelete
  2. From you post about Site to Site VPN and Remote VPN, I can understand more about Site to Site VPN and Remote VPN.
    Firstly, I have learned that a remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers. Secondly, I have learned that a site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN extends the company's network, making computer resources from one location available to employees at other locations.

    ReplyDelete
  3. After reading about your blog post, i have learned more about the part on especially There are two types of site-to-site VPNs:
    Intranet-based -- If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN.
    Extranet-based -- When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets.

    ReplyDelete
  4. Bonjour! Je m'appelle William! Good post regarding your remote-access VPN. Thanks to your blog, I am certainly getting into director's list due to my INKS results. However, it is a bit boring because there is no pictures... Au revoir!

    ReplyDelete
  5. From you post about Site to Site VPN and Remote VPN, I have come to understand more about Site to Site VPN and Remote VPN. I have learned that a remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers.To improve, Maybe you can add pictures, videos, or your voice chat to let readers like myself have a even better and clearer knowledge on what Site VPN, Remote VPN are all about.

    ReplyDelete
  6. This post is very interesting and easy to understand. I have learn a lot about how VPN works from your post. The examples u gave on VPN are quite less. Hence, I would suggest that maybe you can give more examples on how VPN can help us. You can also elaborate more on what Public-Key infrastructure is so that readers like myself will be able to understand more. Also, maybe you can add pictures or videos to let readers like myself have a even better and clearer knowledge on what Public-key infrastructure are all about.

    ReplyDelete
  7. I have understand about VPN alot better thanks to your post. it is well explained but it lacks examples to allow even better understanding

    ReplyDelete
  8. This comment has been removed by the author.

    ReplyDelete
  9. Nice post~ This is very interesting and easy to understand. I have learn a lot about how Site to Site VPN, Remote VPN can be used as a measure for security architecture from your post. The explanation u gave on Site VPN, Remote VPN are quite less. Hence, I would suggest that maybe you can give more examples on how Site VPN, or maybe you could give put pictures for a clearer understanding on how it can help us. You can also elaborate more on the key points of Site VPN, Remote VPN so that readers like myself will be able to understand more. Maybe you can add pictures, videos, or your voice chat to let readers like myself have a even better and clearer knowledge on what Site VPN, Remote VPN are all about.

    ReplyDelete
  10. I like the way this post has been written as it is easy to understand. From this post, I now know more about Remote-access VPN and site-to-site VPN. For example, a remote-access VPN allows individual users to establish secure connections with a remote computer network whilst a site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. I also understand that there are 2 types of Site-to-site VPNs such as the intranet based as well as the extranet based. Although this post is very well written, I think that a few pictures added into the post will be good.

    -Amos Lee

    ReplyDelete