JB-Shope-Consulting-Logo
strong solution gears

Virtual Private Networks (VPN)

A VPN is a virtual computer network that utilizes public telecommunications networks to conduct private data communications. Most VPN implementations use the Internet as the public infrastructure and a variety of specialized protocols to support private communications through the Internet. The purpose of a VPN is to allow secure, encrypted communications between systems connected to the VPN.

A VPN follows a client and server approach. VPN clients authenticate users, encrypt data, and otherwise manage sessions with VPN servers utilizing a technique called tunneling.

OpenVPN - Secure Your Connectivity

OpenVPN_LogoClick to visit siteSince 2002 OpenVPN Technologies has provided a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. Starting with the fundamental premise that complexity is the enemy of security, OpenVPN offers a cost-effective, lightweight alternative to other VPN technologies that is well-targeted for the SME and enterprise markets.

OpenVPN's lightweight design sheds many of the complexities that characterize other VPN implementations. The OpenVPN security model is based on SSL, the industry standard for secure communications via the internet. OpenVPN implements OSI layer 2 or 3 secure network extension using the SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN is not a web application proxy and does not operate through a web browser.

Some Notable Points About the OpenVPN System:

  • Uses a single UDP or TCP port on your firewall
    Tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port. Multiple connections all use the same single port.
  • Uses the FIPS Certified OpenSSL Library
    Use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the Internet.
  • Choice of Encryption Key Methods
    Choose between static-key based conventional encryption or certificate-based public key encryption.
  • Managed Bandwidth Utilization
    Uses real-time, adaptive link compression and traffic-shaping to manage network link bandwidth utilization.
  • Works with Dynamic IP Addresses
    Dynamic IP addresses are used in the bulk of common small business Internet connection methods including: dial-up, cable modems, DSL lines, Verizon FiOS.
  • Flexible Tunneling
    The encrypted network tunnel provided by OpenVPN is able to work with firewalls and NAT'ed connections with little to no changes.