The History of VPN: Early VPNs were often set up to give individual employees secure remote access to their company networks, hence the name “virtual private network”. By connecting to the company’s network, an individual employee can access all the company’s resources and services as if the employee were inside the company.
Since then, VPNs have evolved to provide the same …show more content…
It benefits the separated end systems and helps them to have secured connection.
Remote access VPNs:
Corporate VPN: It makes the VPN of the corporate think that the VPN of the sender is still the same one as his basic office regardless of where he is or what device he is using.
Personal VPN: It is similar to the corporate VPN service but used by individuals to secure any public WIFI networks. All connections will be encrypted, making it impossible for hackers or snoopers to steal any private information.
Why mask my IP address?
Security:
When you use a VPN, your IP address is masked so you can surf the web anonymously. Thus, no one can find out where you connect from or what you do online.
Geographic freedom: By exchanging your IP address with the VPN server’s IP address, you can virtually connect from a geographic location that is different from where you are physically located. This enables you to bypass regional internet restrictions and get access to content or internet services that are otherwise restricted or censored in the location you are staying …show more content…
Because it does not provide any encryption or authentication features by itself, it is usually paired with an encryption protocol such as IPsec.
2. PPTP family
Point Tunneling Protocol (PPTP)
It uses a point-to-point protocol to make a direct connection between two nodes. It was the first VPN protocol to be supported by Microsoft Dial-up Networking and has been bundled into all releases of Microsoft Windows since Windows 95. The Microsoft connection has been an important part of PPTP’s acceptance in the market.
While the PPTP protocol has the advantage of a pre-installed client base on Windows platforms, analysis by cryptography experts have identified several security issues such as its vulnerability to password guessing attacks.
3. SSL family
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
SSL is commonly used to secure online shopping as a user’s web browsers can almost transparently switch to SSL without requiring additional configuration or extra software. SSL was the industry standard before it evolved into Transport Layer Security. The SSL protocol works at the application level independent of the specific network. The “sockets” part of the term refers to the sockets method of passing data back and forth between a client and a server or program layers in the same