What is a VPN – Virtual Private Network or better known as VPN is a way to create a private and secure network using a public network such as the internet. VPN can send data between two computers that pass through a public network so that it seems as if it is connected point to point.
The data is encapsulated (wrapped) with a header containing routing information to get a point to point connection so that the data can pass through the public network and can reach the final destination. Meanwhile, to get a private connection, the data sent must be encrypted first to maintain its confidentiality so that packets caught when passing through the public network are not read because they have to go through the decryption process.
Definition of Virtual Private Network or VPN
You can access the office server via VPN anywhere, whether it’s at home or on the road safely even though you use the internet network infrastructure in its use. According to the user’s view, a VPN connection is a point to point connection between a computer user and a corporate server and data is sent over a dedicated network, even though this is not the case.
VPN is an abbreviation of the word “Virtual Private Network” which is a connection between one network and another network privately (directly) through a “public” network. VPN uses the internet network as an intermediary medium, it can be called a connection, not directly.
Called Private Network because VPN is private, that is, only certain people can access it. Data sent via VPN is encrypted so that it is safe and confidential, even if it is sent over the internet.
By using a VPN, we seem to create a network within the network or it can be called a tunnel. Tunneling is a way of creating private paths using third-party infrastructure. VPNs use one of three existing tunneling technologies: PPTP, L2TP and the latest standard, Internet Protocol Security (IPSec). VPN is a blend of tunneling and encryption technologies.
VPN Benefits
Some of the benefits of using VPN technology are:
- Remote Access: By using a VPN we can access a computer or office network, from anywhere as long as it is connected to the internet or a public network.
- Security: With a VPN connection we can browse, search safely when accessing the virtual world or public internet networks such as hotspots, wifi in cafes.
- Save on network setup costs: VPN can also be used as an alternative way to connect a fairly wide local network at a lower cost. Because the data transmission used in the VPN uses the internet network media or a public network that previously existed without the need to build your own network.
VPN Criteria
- User Authentication. VPN must be able to clarify the identity of the client and limit user access rights according to their authority. VPNs are also required to be able to monitor client activity regarding the time, when, where and how long a client accesses the network and the types of resources it accesses.
- Address Management. The VPN must be able to list client addresses on the intranet and ensure they remain secret.
- Data Encryption. Data passing through the network must be made unreadable by unauthorized parties or clients.
- Key Management. The VPN must be able to generate and update encryption keys for both the server and the client.
- Multiprotocol Support. VPN must be able to handle various protocols in public networks such as IP, IPX and so on.
VPN Functions
The functions of a Virtual Private Network (VPN) are:
- ConfidentiallyVPN technology uses a work system by encrypting all data that passes through it. With the encryption technology, the confidentiality of a data can be more maintained. Although there are third parties who can intercept data that passes through the internet that is the VPN path itself, but not necessarily able to read the data, because the data that passes is scrambled. With the implementation of the encryption system, no one can access and read the contents of the data network easily.
- Data Integrity (Data Integrity)When a data passes through the internet network, in fact the data has traveled very far across various countries. By using this VPN technology, the data sent is maintained in its integrity, starting from sending data until the data arrives at its destination. Even if the contents are disturbed, whether lost, damaged or manipulated by people who are not supposed to.
- Origin Authentication (Source Authentication)VPN technology has the ability to authenticate the sources that send data to be received. All incoming data will be checked and information will be taken from the data source. Then, the address of the data source will be approved if the authentication process is successful. A VPN guarantees that all data sent and received comes from the source it is supposed to be. In this case, no data is falsified or sent by other parties.
Pros and Cons of VPN
The advantages and disadvantages of a VPN are as follows:
Pros of VPN
- VPN is an effective solution for large business organizations with dedicated network facilities
- Increase organizational mobility by directly connecting the home network or mobile workers to the organization.
- Security features can be customized
- Remote connectivity, file sharing, video conferencing
Disadvantages of VPN
- VPN requires extra care to establish a clear security system. This is because sensitive company information can be accessed globally. Therefore, the safety factor is a risk in itself.
Maybe that’s all my information about the meaning of this VPN, friends. Hopefully it can help friends who are looking for understanding virtual private network or this VPN.