Do you know? when you search any data on internet it is not secure.All activity that you are doing seen by ISP(Internet Service Provide) and they can track you. So in such situation you need to secure your data.There are several way to secure your data on internet VPN is one of them.
Virtual Private Network is a technology that create a safe and secure or encrypt your data on less secure network such as Internet.VPN technology was developed as a way to allow remote users and offices to securely access data ,applications and other resources.
The information transmitted between the two locations via the encrypted tunnel cannot be read by anyone else because the system contains several elements to secure both the company's private network and the outside network through which the remote user connects through.
The first step to security is usually a firewall between the client and the host server, requiring the remote user to establish an authenticated connection with the firewall. Encryption is also an important component of a secure VPN. Encryption works by having all data sent from one computer encrypted in such a way that only the computer it is sending to can decrypt the data.
IPSec:-
A set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement VPNs. IPsec supports two encryption modes: transport and tunnel.
PPTP:-
The Point-to-Point Tunneling Protocol is a technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.
L2TP:-
Layer Two (2) Tunneling Protocol is an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs).
Virtual Private Network is a technology that create a safe and secure or encrypt your data on less secure network such as Internet.VPN technology was developed as a way to allow remote users and offices to securely access data ,applications and other resources.
The information transmitted between the two locations via the encrypted tunnel cannot be read by anyone else because the system contains several elements to secure both the company's private network and the outside network through which the remote user connects through.
The first step to security is usually a firewall between the client and the host server, requiring the remote user to establish an authenticated connection with the firewall. Encryption is also an important component of a secure VPN. Encryption works by having all data sent from one computer encrypted in such a way that only the computer it is sending to can decrypt the data.
Main Protocol Use By VPN
There are three main protocol use with VPN Tunnels.These protocols are generally incompatible with each other. They include the following:IPSec:-
A set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement VPNs. IPsec supports two encryption modes: transport and tunnel.
PPTP:-
The Point-to-Point Tunneling Protocol is a technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.
L2TP:-
Layer Two (2) Tunneling Protocol is an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs).