A VPN is used to extend a corporate network or other private network beyond the physical boundaries of this network. An employee who links to the Internet whilst travelling can therefore work exactly as though he were at the job.
The idea of a VPN
Imagine composing a letter to a specific employee of a firm or agency. The mail carrier will never be able to assign the name of the employee, nor will he understand the inner department titles. That the letter however arrives is simply because a transfer point is described. The postman hands over the mail to a central postoffice of the business. This is able to evaluate the internal address information.
vpn service what is it works similarly. The info packets are at first addressed exactly as if the external computer were within the target network. The Internet does not know these internal addresses. Therefore, the entire data packet – like the destination address – is certainly loaded into another data packet. This is an extremely ordinary data deal that may be delivered on the internet. This data packet is certainly sent to the gateway of the corporate network. This gateway forms the “post office”. It could be addressed from the web and knows the internal addresses of the mark network.
So it’s an envelope in the envelope. On the external envelope may be the deliverable address of the destination network, the gateway address. The gateway removes the external envelope and forwards the inner envelope to the internal corporate address to which it is addressed. Because in this manner, data packets with invalid Internet addresses are routed through the Internet, this process is known as “tunneling the Internet”.
Feasible applications of a VPN
The most common application is the mentioned previously connection of exterior computers to an internal network. Nevertheless, a VPN may also be used to reach, for example, blocked websites. The prerequisite for this is a gateway is available that forwards the info packets appropriately and whose address is not blocked. Technical locks are bypassed in this way because they just verify the address of the “outer envelope” – that of the gateway. The actual destination address shows up from the point of view of such blocking systems as part of the content of the data packet that’s not evaluated. You can’t see that the contents of the envelope are another envelope that has another address.