Repair Status FormTechnical Support FormService Inquiry Web FormPick up and drop off form Service Inquiry Web Form Pick up and drop off form Service Inquiry Web Form

Custom Computer Consulting Wired Network Installation

A VPN service provider(Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. This also will use all benefits of the VPN server such as (Speed, Geopgraphic Location, and Security).

VPN, Virtual Private Network is an alternative to VPC (Virtual Private Computing). What is the difference between VPN vs. VNC? VNC, Virtual Network Computing is used for remotely viewing and controlling another computer. A VPN extends a private network across public network. It is where two or more computer systems connected to a private network (LAN) can securely over a shared public network such as the internet. This is accomplished by establishing a virtual point-to-point connection through the use of a dedicated connection, encryption, or a combination of both. It allows you to securely access your own internet while traveling.

VPN connection extends the boundaries of the physical network. Computer that gains access to a VPN can access all the resource of a private network VPN can support a variety of devices. CCC will assist you in determining the best type of VPN is suitable for your needs. Whether to implement a hardware or software based VPN. If it will be shared w/other resources or implementing a dedicated system. This will depend on the amount of clients that will be accessing the VPN service at any given time. We recommend only those with broadband or faster consider implementing a VPN service. As each client connects to the VPN more bandwidth will be required. An alternative is to setup a VNC, refer to the VNC section of the website.

Software based VPN can become bogged down if too many users are accesses the VPN. This will occur specially on those that are being used for other purpose other than a dedicated VPN. If only a limited number of clients will be access it, then the software based VPN are fine.

Hardware based VPNs can vary in cost $100.00 to $200,000.00. The more expensive multiport routers have custom applications, integrated circuits (ASICs), networking protocols, triple data encryption, and advanced technology to handle enterprise or server provider level needs. Design for high performance, massive client loads, redundancy and load balancing is required. For majority of home and business CCC recommends and installs most routers that support VPN avoiding the need for software based VPN. They provide adequate security and features. Many vendors such as Cisco, 3Com, Symantec, Linksys, Asus support VPN functionality.

What Can It do For Me?

I. If you are concern with security while routinely accessing the internet in unsecure
  public places then VPN is for you. It provides a secure network that is not
  available on public networks. It can further provide you with anonymity by altering
  your static IP address. This is very important when accessing personal
  informaton, or anytime you conduct business where valuable information is transmitted.
  A VPN will hamper if not stop a hacker from hacking you. Using either a VPN web
  service or using your own personal VPN you create a secure link.
II. If you wish to link two separate local area networs into a single network via the
  internet that can provide a secure access to resources available on either network.
III. It can provide access to your other computers and devices within your home or
  business local area network.
IV. Access to other smart devices

Remote Access VPN Features

VPN offers 3 Primary Features:

I. File & Folder
II. Remote Printer
III. Remote Desktop Protocol (RDP)

File & Folder Sharing, it is the most commonly used in a VPN environment. You assign accounts and to those you wish to have access to a file and or folders. You must have Administrator credentials.

Remote Printing, any printer with network capability is accessibly by a VPN. This feature allows a PC user to easily print files on the Host computer to their local printer. Also, you can access it via your RDP protocol.

Remote Desktop Protocol (RDP) Graphics Interface to connect to computer over a network connection. Formerly known as Terminal Service. Software that allows you to connect to your home or work computer and have access to all your programs files, and network resources - just as though you were in front of your computer.

Note: Windows has better access control then vista and XP with user account control. Everything that is process is launched in protected mode even if you logged in as Administrator. When using RDP it does not allow for multiple users. However, a program has been written for Windows 7 to allow multiple user access/concurrent user session. There is a Universal terminal Service patch
that can be applied for WinXP, WinVista, Win7, and Windows 8.

VPN support three different modes

I. Remote Access client connections (controls and protects remote access to your
  business or home over the internet. A remote station connects to an ISP. A VPN
  connection is then made via the Client to a remote host (computer server). Once
  connection is established it is as though you were a local host. Commonly used by
  both home and small business.
II. LAN-to-LAN (aka: site-to-site) It involves the use of dedicated VPN hardware at each
  remote site where as Remote Access VPNs utilizes a central site VPN concentrator
  and a software VPN client. A controlled access to individual subnets within a private
  network. It does not involve an ISP but provides a high level of security benefits .
  protecting your WiFi Networks. It can as well bridge two network together to create a .
  larger secure network.
III. Controlled access within the network for the client by creating a secure tunnel by way
  of the internet..

VPN Tunnel Common Protocols

I. PPTP, Point-to-Point Tunneling Protocol (Is the most commonly used in VPN) VPN
  tunnels are created in two step process: PPTP client connects to their ISP using
  the standard mode of communication. A broker device creates a control connection
  between the VPN Client and VPN Server to establish a tunnel using TCP port 1723.
  PPTP security supports authentication, encryption, and packet filtering.
II. L2TP, Layer Two Tunneling Protocol (Is primarily a protocol implemented in Cisco
  It was an effort to improve on L2F and PPTP best features.
III. IPSEC, Internet Protocol Security is a technology protocol suite for secure Inter
  Protocol (IP) communication by authenticating and/or encrypting each IP packet
  during the session..

Other Addition Features:

I. Secure Internet browsing via public unsecured networks
II. Secure E-mail retrieval and sending of message via unsecured networks
III. Accessing peripherals via secure network (such as printers and other devices)
IV. Ability to access web base software support
V. With Additional software you can monitor your network @ home and control
  your PCs remotely.
VI. Access your network from your place of work
VII. Monitoring of security cameras
VIII. Monitoring Internet Access using VPN software (i.e. Network Lockout Administration
  and Classroom Spy.) .

Who supports VPN (Host/Clients):

I. Computers: Desktop, Laptop, Mac OsX, Linux
II. Smart Devices: (iOS,& Android) I-phone,
  I-pad, smart tablets, and smartphones

Advantages:

Comparable easy to setup compared to a VNC setup
Relative inexpensive
Can be used to secure a VNC connection that does support encryption and more secure environment for those that support encryption.
Access resource (such as files, printers, and even run applications, if needed on a secure network.
Files can be stored on a central server and access when need avoiding the files being stored on remote computer, smart tablet or smartphone in the field..

Disadvantage:

Security Issues – More vulnerable when using unsecured assets such as public or personal computer to access a network
Performance Issues – Only dedicated lines can give you guaranteed performance regardless of the traffic load. There can be no bandwidth guarantee when relying on either the internet or the public networks. Only broadband connection should utilize this feature. VPN are only as fast as the slowest internet connection between two endpoints.

CCC - Commonly used VPN Tools
Widely used VPNs (They contain both a VPN server applications (the apps that create virtual private networks on your local network so it is accessible from the outside world) and a VPN client application (the apps that connect to virtual private networks from the internet). VPN Servers and VPN clients neither of these programs are cross-compatible with each other. However they are design to work with a variety of servers’ operating systems.

1st - OpenVPN (openvpn.net)
Open is an open source VPN server. OpenVPN is also able to be integrated into several router firmware packages avoiding the needed of using your operating system. The popular DD-WRT, OpenWRT, and Tomato. It is not computble with popular commercial. It supports Windows PC, MAC, Android, iOS (i-phone/i-pod).

2nd Cisco VPN (cisco.com)
Cisco design more for corporate and educational environments. The cost varies. You can download a FREE Cisco Client. It supports Windows, Mac, iOS, Android (based tablets), and Linux).

3rd LogMeIn Hamachi (www.logmein.com)
Simplest to use and install. Avoid the hassle of configuring routers with open source firmware packets. The client is installed on all machines and servers you want to connect to your network and add them to your Hamachi VPN. The disadvantages is that your VPN is not locally managed it’s controlled by the Hamachi servers. It supports Windows, Mac, Linux, Android, and iOS. The program is FREE but there is subscription service. A standard network subscription and a Premium network subscription. The cost is based on per network and the allowed users on each network.

4th Shrew Soft (www.shrew.net)
Advantages Shrew Soft works with a variety of VPN server protocols (Ipsec, OpenSWAN, freeSWAN, and strongSWAN. There are two editions available Standard and Professional. The professional offers additional features and expires after the trial period. It is available for Windows, Linux and BSD platform.

5th Windows Built-In VPN
Windows has a built in VPN client. Prior to Vista the lacked of features and supported protocols was not available until Windows 7 implementation.

VPN Benefits - Advantages of Virtual Private Networking
If security is crucial where our clients wish to reamin anomity there is a number of online service that can conseal your identity by hidding your IP address. It does this by reassigning your IP address and provide more SSL
These paid service offer additional service that can benefit the user.

SECRUITY

I. Security - create a secure and encrypted tunnel between your computer
II. Routers - VPN can be installed on routers
III. Hotspots - Security for Hotspot Surfers (those that use unsecure WLAN and/or LAN)
IV. Hackers - You can also reduce the risk to hackers and pirates who target your IP
  by attacking the ISP directly
  your PCs remotely.

Anonymous Surfing

I. Anonymous - Traces of your internet activity and your identification, now protected
  now protected under the right of privacy.
II. VPN can bypass all
III. Target Advertising, Avoid target advertiser
IV. ISP Privacy, Protect your privacy from your Internet Service Provider

Free your surfing and data exchange

I. Torrent Safety - use torrent - file exchanges are protected by the IP of the PHN
II. Foreign Broadcast - Watch UK, USA, & Canadian TV (like Zatto, BBC Iplayer, ITV
II. Catchup, 40D, ABC, Five, CBC, Fox, and Hulu) from any around the world.
III. ISP VPN CAPS - Some VPNs prevent local ISPs from speed capping P2P traffic on
  streaming sites like youtube, and direct download sites.
IV. VOIP Unblock - Unblock VOIP applications and service like Skype, Net2phone,
  and Vonage on your mobiel devices.

CCC - Precautions when accessing a VPN

I. Be sure of the health of your own computer or smart device by having the most
  updated virus program installed. Along with all updates virus signatures and software.
II. Also, when downloading, printing, or accessing data over a VPN make sure you are
  not being observed and leave no information behind.
  IMPORTANT: For security reason you should never establish a VPN connection using
III. other computers system shared by the public. Anything that is used by the public can
  be a serverthreat to the confidentiality, integrity of your local network and the data
  contained on it.

Why not use a Proxy Server?
While both a Proxy and VPN service will re-route your internet traffic and change your IP, they function slightly differently. A proxy server acts as a web filter. The proxy settings are applied to your internet browser whether you're using MSIE, Chrome, Safari, Firefox, Etc. When browsing the internet through a proxy server all benefits with that server are used, for example, (Security, Speed, and Geographic Location). The proxy will only secure traffic via the internet browser using the proxy server settings. Unlike a Proxy, a VPN service provider(Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. This also will use all benefits of the VPN server such as (Speed, Geographic Location, and Security). The VPN can be easily connected or disconnected with the click of a button. A proxy server is completely browser based, and is not as compatible with certain web pages that use non-browser technology such as: Comedy Central,Zatoo, Fox OD, and Sky Player. However, a VPN will work with ALL internet based services, but will offer less choice on which applications will get run through your ISP, as with the VPN, everything is routed through that server when connected.

Custom Computer Consulting can advise our client's in the purchase and the installation in a secure VPN tunnel for the both the HOST (server) and/or Client (Computer or Device). We recommend and install hardware base VPNs over software VPNs using either pre-manufactured VNC or an alternative a coded dd-wrt routers using OpenVPN.

CCC - Service Time
An initial evolution will be performed to determine the appropriate system.

CCC - To Schedule a Service (Select the appropriate ICON from the sidebar)

Last Updated: 09/02/2015 11:01