What’s a VPN?

Print anything with Printful



A private network is secure but expensive. A virtual private network (VPN) uses public infrastructure to provide secure access at a reduced cost. VPNs use tunneling and encryption to maintain privacy. There are three types of VPNs: reliable, secure, and hybrid. They are used for various purposes, such as teleconferencing and distance learning.

A private network is a network with secure access and secure transmission. It is possible to build such a network using private or leased lines, but it is expensive to do so. A virtual private network (VPN) is a network that makes use of public telecommunications infrastructure, such as the Internet, in order to provide individuals or remote offices with secure access to the network in their central location or headquarters at a significantly reduced cost. Privacy on a virtual private network is maintained through a combination of security procedures and a data transmission system called tunneling or port forwarding. The standards for virtual private networks come from the Internet Engineering Task Force (IETF).

Tunneling is a method of hiding from the public network the fact that data transmitted over it is part of a private network transmission. There are several ways to approach tunneling. One is called point-to-point tunneling protocol (PPTP). Developed by Microsoft in collaboration with other companies, PPTP allows authorized users to access a virtual private network through an Internet service provider (ISP). Generic Routing Encapsulation System (GRE), developed by Cisco Systems, is an alternative tunneling protocol. Tunneling is not considered effective unless used in conjunction with data encryption and decryption.

There are three types of virtual private networks. Reliable VPNs use dedicated circuits, but transmissions can be compromised when passing through communication switches. The path of a trusted VPN must be set up and consistent, with routing and addressing set up before using it.

Secure VPNs are those that use encryption between the source computer or network all the way to the destination computer or network. To be secure, all traffic on a virtual private network must be encrypted and authenticated. Also, the network must be protected from external tampering with the security properties.

Combining a secure VPN with a reliable VPN produces a hybrid VPN. Often, only part of a reliable VPN is a secure VPN. In this case, it’s important for everyone to be clear about the boundaries of the secure virtual private network so that informed decisions can be made about sending different types of information through different parts of the network.

Virtual private networks are used by for a variety of purposes. Voice VPNs allow teleconferencing and business meetings with remote participants. Educational institutions can use a VPN to grant faculty access to campus facilities and resources when they are off campus, as well as to set up distance learning programs that students attend remotely.




Protect your devices with Threat Protection by NordVPN


Skip to content