Virtual Private Network Discussion

322 words | 2 page(s)

The Virtual Private Network (VPN) is a form of the network which is able to extend a private network over a public network in order to connect users or sites together (Lewis, 2006). The VPN, therefore, employs virtual connections which route the private network to the remote network via the internet (Lewis, 2006). The VPN is able to access the back-end database in two ways which are described by the two types of VPN. The first type is the remote-access VPN (Lewis, 2006).

The remote-type VPN is also referred to as the Virtual Private Dial-up Network (VPDN). The remote-access VPN is mostly used by companies that need to a large remote access where their users can access the back-end database. In this case, the VPN provides a platform for internet dial up to the company’s users using an Internet Service Providers (ISP) (third-party service provider). The remote access VPN connection can be set up where the users dial a number between 1 and 800 to connect to the internet and then use accesses the company’s back-end database through the VPN client software.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Virtual Private Network Discussion".

Order Now
Promocode: custom20

The second type of VPN is the site-to-site VPN (Lewis, 2006). This type of VPN includes where multiple fixed sites are connected over the public internet. The site-to-site VPN allows the encryption of the network such that the connection remains private. The site-to-site VPN can either be an intranet or an extranet. Extranets occur where the site-to-site VPN is set up between offices within the same company. The extranet site-site VPN occurs where the VPN is a company connects to subscribers or customers to allow them access to the back-end database.

The site-to-site is set up by creating local connections which are then connected to the same public network. One characteristic of the site-to-site VPN is that it requires large-scale encryption and dedicated equipment and hence more expensive than the remote-access VPN.

    References
  • Lewis, M. (2006). Comparing, designing, and deploying VPNs. Indianapolis, Ind: Cisco Press.

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now