Using a Virtual Private Network


The term virtual private network, or VPN, refers to several different types of secure forms of Internet communication. In this chapter, a VPN is a secure channel between a remote computer and a local network. This type of VPN enables you to log on to your company network from your home computer. Then you can access any resource on your company network as though you were using a computer that's physically connected to the company network. In other words, the VPN extends the reach of the company network to include your home computer.

TECHNICAL STUFF 

The security mechanism that makes this magic work is the Internet protocol known as IP Sec. The details of how IPSec works are way beyond the scope of this humble little book. Suffice it to say that IPSec encrypts all the Internet traffic related to the VPN. This encryption effectively creates a secret tunnel between the office network and your home computer. Thus, the VPN connection is secure.

Warning 

Although the VPN connection itself is secure, the computer that the VPN connects to may not be. Using a VPN with your home computer is analogous to taking your computer to work and plugging it in to the network. If your computer is already infected with a virus, you run the very real risk of letting that virus loose on your corporate network. As a result, you must be certain that the same security precautions you use with your company network are in use with any computer that you let connect to the network via a VPN. You must therefore ensure that the computer has, at minimum, adequate antivirus protection in place.

In most networks, the VPN is implemented by the firewall router that connects the network to the Internet. Thus, if you plan on providing VPN capability for your network users, you should make sure that the router you use to connect to the Internet has VPN support built in.

The office network side of the VPN is provided by the firewall router. The other side of the VPN-the remote computers-is provided by software that must be installed on the computers themselves. Send a copy of this software home with each user who wants to use the VPN, along with detailed instructions on how to install and configure it. Either that, or you'll have to visit each person's home to install and configure the software yourself. (I wrote instructions for installing VPN software for a user who has a vacation home in Monterey, California. Unfortunately, the instructions were clear enough that he was able to install the VPN software himself, so I didn't have to make a house call. Next time, I'm writing the instructions in Latin.)

After a remote user has used a VPN to connect to your network, the user can access any of the network's shared resources. For example, the user can map network drives and access shared network folders and can also use network printers. And, she can use Outlook to access her e-mail.




Networking For Dummies
Networking For Dummies
ISBN: 0470534052
EAN: 2147483647
Year: 2004
Pages: 254
Authors: Doug Lowe

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net