A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet.
Site-to-site VPN extends the company's network, making computer
resources from one location available to employees at other locations.
An example of a company that needs a site-to-site VPN is a growing
corporation with dozens of branch offices around the world.There are two types of site-to-site VPNs:
- Intranet-based -- If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN.
- Extranet-based -- When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies' LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets.

A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers. An example of a company that needs a remote-access VPN is a large firm with hundreds of salespeople in the field. Another name for this type of VPN is virtual private dial-up network (VPDN), acknowledging that in its earliest form, a remote-access VPN required dialing in to a server using an analog telephone system.
There are two components required in a remote-access VPN. The first is a network access server, also called a media gateway or a remote-access server (RAS). A NAS might be a dedicated server, or it might be one of multiple software applications running on a shared server. It's a NAS that a user connects to from the Internet in order to use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN. To authenticate the user's credentials, the NAS uses either its own authentication process or a separate authentication server running on the network.
The other required component of remote-access VPNs is client software. In other words, employees who want to use the VPN from their computers require software on those computers that can establish and maintain a connection to the VPN
This post is very interesting and easy to understand. I have learn a lot about how Site to Site VPN, Remote VPN can be used as a measure for security architecture from your post. The explanation u gave on Site VPN, Remote VPN are quite less. Hence, I would suggest that maybe you can give more examples on how Site VPN, Remote VPN works and how it can help us. You can also elaborate more on the key points of Site VPN, Remote VPN so that readers like myself will be able to understand more. Also, nice use of pictures. Maybe you can add more pictures, videos, or your voice chat to let readers like myself have a even better and clearer knowledge on what Site VPN, Remote VPN are all about.
ReplyDeleteFrom your post about Site to Site VPN and Remote VPN, I have learned more about Site to Site VPN and Remote VPN.
ReplyDeleteFirstly, I have learned that a site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN extends the company's network, making computer resources from one location available to employees at other locations. Secondly, I have learned that A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers.
his post is very interesting and easy to understand. I have learn a lot about how Site to Site VPN, Remote VPN can be used as a measure for security architecture from your post. The explanation u gave on Site VPN, Remote VPN are quite less. Hence, I would suggest that maybe you can give more examples on how Site VPN.
ReplyDeleteVPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network's servers.
-Adler
This post looks similar to Williams post. I like your usage of pictures and use of simple language to convey the complex topic that is VPN. This topic may be hard to visualize for some, but your pictures seem to illustrate the topic simply.
ReplyDeleteThis post is very interesting and easy to understand. I have learn a lot about how VPN works from your post. The examples u gave on VPN are quite less. Hence, I would suggest that maybe you can give more examples on how VPN can help us. You can also elaborate more on what Public-Key infrastructure is so that readers like myself will be able to understand more. Also, maybe you can add pictures or videos to let readers like myself have a even better and clearer knowledge on what Public-key infrastructure are all about.
ReplyDeleteYour post here with images clearly illustrate the explanations given. The source where you obtained the information is similar to mine :P Overall, excellent stuff~ Easy to understand, easy to read, easy to see.
ReplyDeleteGood use of pictures so that your post is not boring and your post is ready to understand. Good job and keep up the good work.
ReplyDelete