VPN is a local communication network that is connected through public network media. The most widely used public infrastructure is the internet. To obtain secure communication (private) via the internet, special protocols are needed to regulate the security of data. In this way, the same rights and arrangements will be obtained as in the office or LAN itself, even though it actually uses a publicly owned network. You also need the best vpn chrome extension.
And to get a private connection, the data sent must be encrypted first to maintain confidentiality so that packets caught when passing through the public network are unreadable because they have to go through the decryption process. The process of data encapsulation is often called “tunneling”. VPN can connect two end-systems or two computers, or even between two or more different networks.
In the network world, a tunnel is defined as a way to encapsulate or wrap IP packets in another IP packet, where the point behind the IP Tunnel will deliver IP packets through the tunnel being created and send them to a point behind another tunnel. The point is tunneling is a way to create a private path using third party infrastructure. When an IP packet can be reached by each client-side behind the IP tunnel, the IP Header Tunnel and some additional Tuner Headers that wrap the IP packet will be removed and the original IP packet will be injected into the IP Stack at the point behind the IP Tunnel. A tunnel is equipped with an encryption system for every data that passes. The encryption system makes technology safer and more personal.
Encryption technology guarantees that data passing through the tunnel cannot be read by anyone other than the destination computer device as a legitimate recipient. Encryption will change information that passes through the tunnel into chaotic texts that have no meaning at all when reading directly. To make it return to the original text, the decryption process is needed. The decryption process is the process of re-establishing chaotic texts. This process usually occurs at the ends of this VPN connection.
At both ends (end systems) of these VPN devices usually have agreed on an algorithm that will be used to carry out the decryption process. Thus, the data will arrive safely and safely enough for a transaction that passes through the public channel.
VPN is currently widely used to be applied to extranet networks or intranets of large companies. VPNs must be able to support at least 3 usage modes:
- Client connection for remote access
- LAN-to-LAN internetworking
- Controlling access on an intranet
Criteria that a VPN must meet:
VPNs must be able to clarify the identity of clients and limit user access rights according to their authority. VPNs are also required to be able to monitor client activities regarding the time, when, where and how long a client accesses the network and the types of resources it accesses.
VPNs must be able to put the client’s address on the intranet and ensure that it remains confidential.
Data that passes through the network must be made so that it cannot be read by unauthorized parties or clients.