VPN USAGE AND NETWORKS
With this approach is intended to connect networks different enter themselves through a network that not is safe, mainly Internet. It is the approach chosen by companies to connect networks of different locations that are geographically separated to share information securely. There are several types of VPNs in the network. Within this approach we can find with the tunnels IPSec.
IPSec tunnels are the simplest approach to a VPN network and most routers and network firewalls have this feature. This type of approach not is more than establish a tunnel (tunneling) so all the traffic that is exchanged between two networks trip of way encrypted. Although this same approach is can use to encapsulate the traffic to a single device.
In this type of approach is necessary that is establish them ends of the tunnel, i.e. those devices responsible of encapsulate and decapsulates the information that travels encrypted. In addition, you must set will give authentication (passwords or certificates), and the type of traffic that will flow through the established tunnel.
To define the traffic that can travel by the VPN, in the tunnels IPsec is can have political to restrict the traffic that flows through them. Them lists of control of access (ACL) is used to establish VPN based in policy.
When using this type of approach sets a single tunnel between two sites to provide access to resources and in a more controlled manner. For example, you could use to give access to a supplier or customer to the company-specific information.
In contrast with the tunnels IPCSec based in political, found them tunnels IPsec based on routes that work as a link virtual and that allows that any type of traffic flow through them.
Not there is an excuse for not protecting the communications
Whether you’re looking for to protect the access to a network while you’re traveling, protect the data of navigation in the case of using a public Wi-Fi network, enter on sites with geographic blocking or avoid Internet censorship, the use of a VPN is the best alternative that we have to ensure that at the time of exchange our information is done safely.
There are various VPN services that we use to achieve our goal of ensuring the privacy of our data, we can choose from free alternatives or some that guarantee us the privacy we need for few dollars a month. Of course, as with many other services, options no cost make their profit on the other hand, often collecting personal data and navigation.
So, if you combine this measure of protection with anti-malware solution, a properly configured firewall and responsible behaviour, as a user you can provide high levels of security to your information.