
A VPN service provider(Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. This also will use all benefits of the VPN server such as (Speed, Geopgraphic Location, and Security).
VPN, Virtual Private Network is an alternative to VPC (Virtual Private Computing). What is the difference between VPN vs. VNC? VNC, Virtual Network Computing is used for remotely viewing and controlling another computer. A VPN extends a private network across public network. It is where two or more computer systems connected to a private network (LAN) can securely over a shared public network such as the internet. This is accomplished by establishing a virtual point-to-point connection through the use of a dedicated connection, encryption, or a combination of both. It allows you to securely access your own internet while traveling.
VPN connection extends the boundaries of the physical network. Computer that gains access to a VPN can access all the resource of a private network VPN can support a variety of devices. CCC will assist you in determining the best type of VPN is suitable for your needs. Whether to implement a hardware or software based VPN. If it will be shared w/other resources or implementing a dedicated system. This will depend on the amount of clients that will be accessing the VPN service at any given time. We recommend only those with broadband or faster consider implementing a VPN service. As each client connects to the VPN more bandwidth will be required. An alternative is to setup a VNC, refer to the VNC section of the website.
Software based VPN can become bogged down if too many users are accesses the VPN. This will occur specially on those that are being used for other purpose other than a dedicated VPN. If only a limited number of clients will be access it, then the software based VPN are fine.
Hardware based VPNs can vary in cost $100.00 to $200,000.00. The more expensive multiport routers have custom applications,
integrated circuits (ASICs), networking protocols, triple data encryption, and advanced technology to handle enterprise or server
provider level needs. Design for high performance, massive client loads, redundancy and load balancing is required. For majority of home and business CCC recommends and installs most routers that support VPN avoiding the need for software based VPN. They provide adequate security and features. Many vendors such as Cisco, 3Com, Symantec, Linksys, Asus support VPN functionality.
What Can It do For Me?
| I. | If you are concern with security while routinely accessing the internet in unsecure |
| public places then VPN is for you. It provides a secure network that is not | |
| available on public networks. It can further provide you with anonymity by altering | |
| your static IP address. This is very important when accessing personal | |
| informaton, or anytime you conduct business where valuable information is transmitted. | |
| A VPN will hamper if not stop a hacker from hacking you. Using either a VPN web | |
| service or using your own personal VPN you create a secure link. | |
| II. | If you wish to link two separate local area networs into a single network via the |
| internet that can provide a secure access to resources available on either network. | |
| III. | It can provide access to your other computers and devices within your home or |
| business local area network. | |
| IV. | Access to other smart devices |
Remote Access VPN Features
VPN offers 3 Primary Features:
| I. | File & Folder |
| II. | Remote Printer |
| III. | Remote Desktop Protocol (RDP) |
File & Folder Sharing, it is the most commonly used in a VPN environment. You assign accounts and to those you wish to have access to a file and or folders. You must have Administrator credentials.
Remote Printing, any printer with network capability is accessibly by a VPN. This feature allows a PC user to easily print files on the Host computer to their local printer. Also, you can access it via your RDP protocol.
Remote Desktop Protocol (RDP) Graphics Interface to connect to computer over a network connection. Formerly known as Terminal Service. Software that allows you to connect to your home or work computer and have access to all your programs files, and network resources - just as though you were in front of your computer.
Note: Windows has better access control then vista and XP with user account control. Everything that is process is launched in
protected mode even if you logged in as Administrator. When using RDP it does not allow for multiple users. However, a program
has been written for Windows 7 to allow multiple user access/concurrent user session. There is a Universal terminal Service patch
that can be applied for WinXP, WinVista, Win7, and Windows 8.
VPN support three different modes
| I. | Remote Access client connections (controls and protects remote access to your |
| business or home over the internet. A remote station connects to an ISP. A VPN | |
| connection is then made via the Client to a remote host (computer server). Once | |
| connection is established it is as though you were a local host. Commonly used by | |
| both home and small business. | |
| II. | LAN-to-LAN (aka: site-to-site) It involves the use of dedicated VPN hardware at each |
| remote site where as Remote Access VPNs utilizes a central site VPN concentrator | |
| and a software VPN client. A controlled access to individual subnets within a private | |
| network. It does not involve an ISP but provides a high level of security benefits . | |
| protecting your WiFi Networks. It can as well bridge two network together to create a . | |
| larger secure network. | |
| III. | Controlled access within the network for the client by creating a secure tunnel by way |
| of the internet.. |
VPN Tunnel Common Protocols
| I. | PPTP, Point-to-Point Tunneling Protocol (Is the most commonly used in VPN) VPN |
| tunnels are created in two step process: PPTP client connects to their ISP using | |
| the standard mode of communication. A broker device creates a control connection | |
| between the VPN Client and VPN Server to establish a tunnel using TCP port 1723. | |
| PPTP security supports authentication, encryption, and packet filtering. | |
| II. | L2TP, Layer Two Tunneling Protocol (Is primarily a protocol implemented in Cisco |
| It was an effort to improve on L2F and PPTP best features. | |
| III. | IPSEC, Internet Protocol Security is a technology protocol suite for secure Inter |
| Protocol (IP) communication by authenticating and/or encrypting each IP packet | |
| during the session.. |
Other Addition Features:
| I. | Secure Internet browsing via public unsecured networks |
| II. | Secure E-mail retrieval and sending of message via unsecured networks |
| III. | Accessing peripherals via secure network (such as printers and other devices) |
| IV. | Ability to access web base software support |
| V. | With Additional software you can monitor your network @ home and control |
| your PCs remotely. | |
| VI. | Access your network from your place of work |
| VII. | Monitoring of security cameras |
| VIII. | Monitoring Internet Access using VPN software (i.e. Network Lockout Administration |
| and Classroom Spy.) . |
Who supports VPN (Host/Clients):
| I. | Computers: Desktop, Laptop, Mac OsX, Linux |
| II. | Smart Devices: (iOS,& Android) I-phone, |
| I-pad, smart tablets, and smartphones |
Advantages:
Comparable easy to setup compared to a VNC setup |
|
|---|---|
| Relative inexpensive | |
| Can be used to secure a VNC connection that does support encryption and more secure environment for those that support encryption. | |
| Access resource (such as files, printers, and even run applications, if needed on a secure network. | |
| Files can be stored on a central server and access when need avoiding the files being stored on remote computer, smart tablet or smartphone in the field.. |
Disadvantage:
Security Issues – More vulnerable when using unsecured assets such as public or personal computer to access
a network |
|
|---|---|
| Performance Issues – Only dedicated lines can give you guaranteed performance regardless of the traffic load. There can be no bandwidth guarantee when relying on either the internet or the public networks. Only broadband connection should utilize this feature. VPN are only as fast as the slowest internet connection between two endpoints. |
CCC - Commonly used VPN Tools
Widely used VPNs (They contain both a VPN server applications (the apps that create virtual private networks on your local network so it is accessible from the outside world) and a VPN client application (the apps that connect to virtual private networks from the internet). VPN Servers and VPN clients neither of these programs are cross-compatible with each other. However they are design to work with a variety of servers’ operating systems.
1st - OpenVPN (openvpn.net)
Open is an open source VPN server. OpenVPN is also able to be integrated into several router firmware packages avoiding the needed of using your operating system. The popular DD-WRT, OpenWRT, and Tomato. It is not computble with popular commercial. It supports Windows PC, MAC, Android, iOS (i-phone/i-pod).2nd Cisco VPN (cisco.com)
Cisco design more for corporate and educational environments. The cost varies. You can download a FREE Cisco Client. It supports Windows, Mac, iOS, Android (based tablets), and Linux).3rd LogMeIn Hamachi (www.logmein.com)
Simplest to use and install. Avoid the hassle of configuring routers with open source firmware packets. The client is installed on all machines and servers you want to connect to your network and add them to your Hamachi VPN. The disadvantages is that your VPN is not locally managed it’s controlled by the Hamachi servers. It supports Windows, Mac, Linux, Android, and iOS. The program is FREE but there is subscription service. A standard network subscription and a Premium network subscription. The cost is based on per network and the allowed users on each network.4th Shrew Soft (www.shrew.net)
Advantages Shrew Soft works with a variety of VPN server protocols (Ipsec, OpenSWAN, freeSWAN, and strongSWAN. There are two editions available Standard and Professional. The professional offers additional features and expires after the trial period. It is available for Windows, Linux and BSD platform.5th Windows Built-In VPN
Windows has a built in VPN client. Prior to Vista the lacked of features and supported protocols was not available until Windows 7 implementation.
VPN Benefits - Advantages of Virtual Private Networking
If security is crucial where our clients wish to reamin anomity there is a number of online service that can conseal your identity by hidding your IP address. It does this by reassigning your IP address and provide more SSL
These paid service offer additional service that can benefit the user.
SECRUITY
| I. | Security - create a secure and encrypted tunnel between your computer |
| II. | Routers - VPN can be installed on routers |
| III. | Hotspots - Security for Hotspot Surfers (those that use unsecure WLAN and/or LAN) |
| IV. | Hackers - You can also reduce the risk to hackers and pirates who target your IP |
| by attacking the ISP directly | |
| your PCs remotely. |
Anonymous Surfing
| I. | Anonymous - Traces of your internet activity and your identification, now protected |
| now protected under the right of privacy. | |
| II. | VPN can bypass all |
| III. | Target Advertising, Avoid target advertiser |
| IV. | ISP Privacy, Protect your privacy from your Internet Service Provider |
Free your surfing and data exchange
| I. | Torrent Safety - use torrent - file exchanges are protected by the IP of the PHN |
| II. | Foreign Broadcast - Watch UK, USA, & Canadian TV (like Zatto, BBC Iplayer, ITV |
| II. | Catchup, 40D, ABC, Five, CBC, Fox, and Hulu) from any around the world. |
| III. | ISP VPN CAPS - Some VPNs prevent local ISPs from speed capping P2P traffic on |
| streaming sites like youtube, and direct download sites. | |
| IV. | VOIP Unblock - Unblock VOIP applications and service like Skype, Net2phone, |
| and Vonage on your mobiel devices. |
CCC - Precautions when accessing a VPN
| I. | Be sure of the health of your own computer or smart device by having the most |
| updated virus program installed. Along with all updates virus signatures and software. | |
| II. | Also, when downloading, printing, or accessing data over a VPN make sure you are |
| not being observed and leave no information behind. | |
| IMPORTANT: For security reason you should never establish a VPN connection using | |
| III. | other computers system shared by the public. Anything that is used by the public can |
| be a serverthreat to the confidentiality, integrity of your local network and the data | |
| contained on it. |
Why not use a Proxy Server?
While both a Proxy and VPN service will re-route your internet traffic and change your IP, they function slightly differently. A proxy server acts as a web filter. The proxy settings are applied to your internet browser whether you're using MSIE, Chrome, Safari, Firefox, Etc. When browsing the internet through a proxy server all benefits with that server are used, for example, (Security, Speed, and Geographic Location). The proxy will only secure traffic via the internet browser using the proxy server settings. Unlike a Proxy, a VPN service provider(Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. This also will use all benefits of the VPN server such as (Speed, Geographic Location, and Security).
The VPN can be easily connected or disconnected with the click of a button. A proxy server is completely browser based, and is not as compatible with certain web pages that use non-browser technology such as: Comedy Central,Zatoo, Fox OD, and Sky Player. However, a VPN will work with ALL internet based services, but will offer less choice on which applications will get run through your ISP, as with the VPN, everything is routed through that server when connected.
Custom Computer Consulting can advise our client's in the purchase and the installation in a secure VPN tunnel for the both the HOST (server) and/or Client (Computer or Device). We recommend and install hardware base VPNs over software VPNs using either pre-manufactured VNC or an alternative a coded dd-wrt routers using OpenVPN.
CCC - Service Time
An initial evolution will be performed to determine the appropriate system.
CCC - To Schedule a Service (Select the appropriate ICON from the sidebar)
Last Updated: 09/02/2015 11:01