Virtual Private Network (VPN)

29
Knowledge Base Why use a Virtual Private Network (VPN)?

Transcript of Virtual Private Network (VPN)

Page 1: Virtual Private Network (VPN)

Knowledge Base

Why use aVirtual Private Network (VPN)?

Page 2: Virtual Private Network (VPN)

Why use a VPN?

The typical representation of a person accessing

the Internet looks like this:

Page 3: Virtual Private Network (VPN)

Why use a VPN?

The typical representation of a person accessing

the Internet looks like this:

Page 4: Virtual Private Network (VPN)

Why use a VPN?

The typical representation of a person accessing

the Internet looks like this:

Using a device (such has a computer) to submit

information on internet in order to reach a remote

service.

Page 5: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Page 6: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Page 7: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 8: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 9: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 10: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 11: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 12: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 13: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 14: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 15: Virtual Private Network (VPN)

Why use a VPN?

But the cloud is composed of a multitude of devices

allowing interconnectivity.

Each device sends traffic along, following routing

tables that may change over time.

Page 16: Virtual Private Network (VPN)

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Page 17: Virtual Private Network (VPN)

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Page 18: Virtual Private Network (VPN)

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Any of these devices could have been hijacked by

a malicious user capturing the information as it

travels.

Page 19: Virtual Private Network (VPN)

Why use a VPN?

Any device that intervenes in the connection

obviously sees the information that travels through it.

Any of these devices could have been hijacked by

a malicious user capturing the information as it

travels.

Page 20: Virtual Private Network (VPN)

Why use a VPN?

For web traffic as portrayed in our example, SSL

encryption exists to make all information unreadable

by both parties agreement on an encryption key.

Page 21: Virtual Private Network (VPN)

Why use a VPN?

For web traffic as portrayed in our example, SSL

encryption exists to make all information unreadable

by both parties agreement on an encryption key.

Page 22: Virtual Private Network (VPN)

Why use a VPN?

For web traffic as portrayed in our example, SSL

encryption exists to make all information unreadable

by both parties agreement on an encryption key.

But some protocols and services do not have that

alternative. Another solution was needed.

Page 23: Virtual Private Network (VPN)

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Page 24: Virtual Private Network (VPN)

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Page 25: Virtual Private Network (VPN)

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted

Page 26: Virtual Private Network (VPN)

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Page 27: Virtual Private Network (VPN)

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

Page 28: Virtual Private Network (VPN)

Why use a VPN?

In an office environment, the solution was to create a

tunnel through which all information was encrypted.

VPN allows users to safely use any protocol (even if

they still are vulnerable to snooping) by encrypting

and decrypting at both ends of the tunnel.

Page 29: Virtual Private Network (VPN)

Visit us at: devolutions.net

Devolutions is the creator of

Remote Desktop Manager,

a tool to manage remote

access technologies,

credentials, and VPNs.