http://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&feed=atom&action=historyVirtual Private Network - Revision history2024-03-29T07:37:02ZRevision history for this page on the wikiMediaWiki 1.15.1http://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3125&oldid=prevPliassn: /* Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup> */2008-04-14T03:55:28Z<p><span class="autocomment">Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup></span></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:55, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 45:</td>
<td colspan="2" class="diff-lineno">Line 45:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By type of medium:'''</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By type of medium:'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Protected:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Protected:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Most popular type of VPNs. With these it is possible to create secure subnetworks based on a public network (Internet).</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Most popular type of VPNs. With these it is possible to create secure subnetworks based on a public network (Internet).</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>These are: IPSec, OpenVPN and PPTP.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>These are: IPSec, OpenVPN and PPTP.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Trusted:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Trusted:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used in cases where a secure network is already provided and there is only a need for organizing a virtual subnetwork.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used in cases where a secure network is already provided and there is only a need for organizing a virtual subnetwork.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>These are: Multi-protocol label switching (MPLS) and L2TP (Layer 2 Tunnelling Protocol).</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>These are: Multi-protocol label switching (MPLS) and L2TP (Layer 2 Tunnelling Protocol).</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 55:</td>
<td colspan="2" class="diff-lineno">Line 55:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By implementation'''</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By implementation'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Hardware:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Hardware:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>The VPN is implemented with a number of dedicated hardware devices. This allows for efficiency and usually security.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>The VPN is implemented with a number of dedicated hardware devices. This allows for efficiency and usually security.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Software:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Software:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>The VPN is implemented as a software package.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>The VPN is implemented as a software package.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Integrated:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Integrated:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Functionality of the VPN is provided in a package of both hardware and software that also handles packet filtering, firewall and other network services.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Functionality of the VPN is provided in a package of both hardware and software that also handles packet filtering, firewall and other network services.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By use'''</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By use'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Intranet VPN:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Intranet VPN:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Remote Access VPN:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Remote Access VPN:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a private link between a segment of a corporation network and an employee that can connect to the company resources from a remote location.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a private link between a segment of a corporation network and an employee that can connect to the company resources from a remote location.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Extranet VPN:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* <ins class="diffchange diffchange-inline">''</ins>Extranet VPN:<ins class="diffchange diffchange-inline">''</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for networks that allow "semi-trusted" users (like clients) to connect to a company network. These users are not part of the corporation and so should have limited access to the company's resources.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for networks that allow "semi-trusted" users (like clients) to connect to a company network. These users are not part of the corporation and so should have limited access to the company's resources.</div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3124&oldid=prevPliassn: /* Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup> */2008-04-14T03:54:29Z<p><span class="autocomment">Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup></span></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:54, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 66:</td>
<td colspan="2" class="diff-lineno">Line 66:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By use'''</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By use'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Intranet VPN:<del class="diffchange diffchange-inline">Retrieved on 13-04-2008</del></div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* Intranet VPN:</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.</div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3123&oldid=prevPliassn: /* Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup> */2008-04-14T03:52:25Z<p><span class="autocomment">Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup></span></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:52, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 47:</td>
<td colspan="2" class="diff-lineno">Line 47:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Protected:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Protected:</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Most popular type of VPNs. With these it is possible to create secure subnetworks based on a public network (Internet).</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Most popular type of VPNs. With these it is possible to create secure subnetworks based on a public network (Internet).</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>These are: IPSec, OpenVPN <del class="diffchange diffchange-inline">и </del>PPTP.</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>These are: IPSec, OpenVPN <ins class="diffchange diffchange-inline">and </ins>PPTP.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Trusted:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Trusted:</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used in cases where a secure network is already provided and there is only a need for organizing a virtual subnetwork.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used in cases where a secure network is already provided and there is only a need for organizing a virtual subnetwork.</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>These are: Multi-protocol label switching (MPLS) <del class="diffchange diffchange-inline">и </del>L2TP (Layer 2 Tunnelling Protocol).</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>These are: Multi-protocol label switching (MPLS) <ins class="diffchange diffchange-inline">and </ins>L2TP (Layer 2 Tunnelling Protocol).</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By implementation'''</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>'''By implementation'''</div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3122&oldid=prevPliassn at 03:43, 14 April 20082008-04-14T03:43:18Z<p></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:43, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 2:</td>
<td colspan="2" class="diff-lineno">Line 2:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== How It Works ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== How It Works ==</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>[[Image:vpn-1_sc_connect.jpg|thumb|350px|right]]</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>[[Image:vpn-1_sc_connect.jpg|thumb|350px|right<ins class="diffchange diffchange-inline">|An illustration of a VPN network</ins>]]</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>A VPN is possible because of two things. Tunneling and Encryption.<sup>1</sup></div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>A VPN is possible because of two things. Tunneling and Encryption.<sup>1</sup></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [[Tunneling]]:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [[Tunneling]]:</div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3121&oldid=prevPliassn at 03:40, 14 April 20082008-04-14T03:40:59Z<p></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:40, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 100:</td>
<td colspan="2" class="diff-lineno">Line 100:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== See Also ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== See Also ==</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>[[Conventional Encryption Algorithms]]</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins class="diffchange diffchange-inline">* </ins>[[Conventional Encryption Algorithms]]</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>[[SSH Tunneling]]</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins class="diffchange diffchange-inline">* </ins>[[SSH Tunneling]]</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>[[McMaster University]]</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins class="diffchange diffchange-inline">* </ins>[[McMaster University]]</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>[[Secure File Transfer Protocols]]</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins class="diffchange diffchange-inline">* </ins>[[Secure File Transfer Protocols]]</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== External Links ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== External Links ==</div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3120&oldid=prevPliassn at 03:40, 14 April 20082008-04-14T03:40:30Z<p></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:40, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 98:</td>
<td colspan="2" class="diff-lineno">Line 98:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* VPN Quarantine</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* VPN Quarantine</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* MPVPN</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* MPVPN</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">== See Also ==</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">[[Conventional Encryption Algorithms]]</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">[[SSH Tunneling]]</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">[[McMaster University]]</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">[[Secure File Transfer Protocols]]</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== External Links ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== External Links ==</div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3119&oldid=prevPliassn at 03:29, 14 April 20082008-04-14T03:29:47Z<p></p>
<table style="background-color: white; color:black;">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr valign='top'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 03:29, 14 April 2008</td>
</tr>
<tr><td colspan="2" class="diff-lineno">Line 1:</td>
<td colspan="2" class="diff-lineno">Line 1:</td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>A '''Virtual Private Network''' ('''VPN''') is used to create secure connections between hosts. This is accomplished through tunneling and encryption. The advantage of a VPN is an <del class="diffchange diffchange-inline">inherit </del>transparency of the service. This makes it valuable to different entities on the Internet, like corporations that want to provide secure connections to its employees.</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>A '''Virtual Private Network''' ('''VPN''') is used to create secure connections between hosts <ins class="diffchange diffchange-inline">on the Internet</ins>. This is accomplished through tunneling and encryption. The advantage of a VPN is an <ins class="diffchange diffchange-inline">inherent </ins>transparency of the service. This makes it valuable to different entities on the Internet, like corporations that want to provide secure connections to its employees.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== How It Works ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== How It Works ==</div></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div> </div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins class="diffchange diffchange-inline">[[Image:vpn-1_sc_connect.jpg|thumb|350px|right]]</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>A VPN is possible because of two things. Tunneling and Encryption.<sup>1</sup></div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>A VPN is possible because of two things. Tunneling and Encryption.<sup>1</sup></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [[Tunneling]]:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [[Tunneling]]:</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 28:</td>
<td colspan="2" class="diff-lineno">Line 28:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>At first, when two computers needed to be connected securely, a dedicated connection, in the shape of a direct cable, was established. This approach guaranteed that no information would be intercepted by placing the cable into difficult to reach places and by controlling access to it. The problem was that such a solution was only possible for short distances, laying a dedicated cable across a city (let alone a country) was extraordinary expensive.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>At first, when two computers needed to be connected securely, a dedicated connection, in the shape of a direct cable, was established. This approach guaranteed that no information would be intercepted by placing the cable into difficult to reach places and by controlling access to it. The problem was that such a solution was only possible for short distances, laying a dedicated cable across a city (let alone a country) was extraordinary expensive.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>On the other hand, during the end of the last century, there was a significant growth of the Internet. This enabled two computers virtually anywhere on Earth to be connected with a reliable and fast connection. On the other hand, the information traveling through the Internet could be easily intercepted. Because of this, there was a strive to create a virtual link through the physical network that would be protected from hampering with cryptography. This approach would be many times cheaper then creating a dedicated, physical link, and could be afforded by small companies.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>On the other hand, during the end of the last century, there was a significant growth of the Internet. This enabled two computers virtually anywhere on Earth to be connected with a reliable and fast connection. On the other hand, the information traveling through the Internet could be easily intercepted. Because of this, there was a strive to create a virtual link through the physical network that would be protected from hampering with cryptography. This approach would be many times cheaper then creating a dedicated, physical link, and could be afforded by small companies.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>When the idea caught on, it was extremely popular. Many IT corporations developed implementations of virtual private networks, not just in software but also on the hardware level. For example some of the companies that provided a VPN solution are:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>When the idea caught on, it was extremely popular. Many IT corporations developed implementations of virtual private networks, not just in software but also on the hardware level. For example some of the companies that provided a VPN solution are:</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 41:</td>
<td colspan="2" class="diff-lineno">Line 43:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup> ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup> ==</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>'''<del class="diffchange diffchange-inline">by </del>type of medium:'''</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>'''<ins class="diffchange diffchange-inline">By </ins>type of medium:'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Protected:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Protected:</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 51:</td>
<td colspan="2" class="diff-lineno">Line 53:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>These are: Multi-protocol label switching (MPLS) и L2TP (Layer 2 Tunnelling Protocol).</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>These are: Multi-protocol label switching (MPLS) и L2TP (Layer 2 Tunnelling Protocol).</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>'''<del class="diffchange diffchange-inline">by </del>implementation'''</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>'''<ins class="diffchange diffchange-inline">By </ins>implementation'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Hardware:</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* Hardware:</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 62:</td>
<td colspan="2" class="diff-lineno">Line 64:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Functionality of the VPN is provided in a package of both hardware and software that also handles packet filtering, firewall and other network services.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Functionality of the VPN is provided in a package of both hardware and software that also handles packet filtering, firewall and other network services.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>'''<del class="diffchange diffchange-inline">by </del>use'''</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>'''<ins class="diffchange diffchange-inline">By </ins>use'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>* Intranet VPN:</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>* Intranet VPN:<ins class="diffchange diffchange-inline">Retrieved on 13-04-2008</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 76:</td>
<td colspan="2" class="diff-lineno">Line 78:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for networks that allow "semi-trusted" users (like clients) to connect to a company network. These users are not part of the corporation and so should have limited access to the company's resources.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>Used for networks that allow "semi-trusted" users (like clients) to connect to a company network. These users are not part of the corporation and so should have limited access to the company's resources.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>-</td><td style="background: #ffa; color:black; font-size: smaller;"><div>'''<del class="diffchange diffchange-inline">by </del>type of protocol'''</div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>'''<ins class="diffchange diffchange-inline">By </ins>type of protocol'''</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>There are implementations of VPNs for TCP/IP, IPX and AppleTalk. But there is a general trend toward TCP/IP and practically every implementation supports TCP/IP.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>There are implementations of VPNs for TCP/IP, IPX and AppleTalk. But there is a general trend toward TCP/IP and practically every implementation supports TCP/IP.</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 87:</td>
<td colspan="2" class="diff-lineno">Line 89:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>McMaster uses a VPN to let its students and staff to remotely connect and use the university resources. It can also be used to transfer files securely onto a university machine. For a student to connect to McMaster VPN they need to posses a MacID. McMaster recommends the use of a Cisco VPN client<sup>[http://www.mcmaster.ca/uts/network/vpn 3]</sup>, but other clients are also supported. Machines running Microsoft Windows are required to have up to date anti-virus software installed prior to connecting to the VPN.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>McMaster uses a VPN to let its students and staff to remotely connect and use the university resources. It can also be used to transfer files securely onto a university machine. For a student to connect to McMaster VPN they need to posses a MacID. McMaster recommends the use of a Cisco VPN client<sup>[http://www.mcmaster.ca/uts/network/vpn 3]</sup>, but other clients are also supported. Machines running Microsoft Windows are required to have up to date anti-virus software installed prior to connecting to the VPN.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">== Security ==</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">Most, but not all, VPN implementations use cryptography. Those that do include the following protocols:<sup>[http://en.wikipedia.org/wiki/Vpn 4]</sup></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* IPsec (IP security)</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* SSL/TLS</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* OpenVPN</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* L2TPv3 (Layer 2 Tunneling Protocol version 3)</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* VPN Quarantine</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* MPVPN</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== External Links ==</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>== External Links ==</div></td></tr>
<tr><td colspan="2" class="diff-lineno">Line 96:</td>
<td colspan="2" class="diff-lineno">Line 107:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [2] VPN in Russian Wikipedia. Retrieved on 13-04-2008 http://ru.wikipedia.org/wiki/VPN</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [2] VPN in Russian Wikipedia. Retrieved on 13-04-2008 http://ru.wikipedia.org/wiki/VPN</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [3] McMaster University VPN FAQ and installation guide. Retrieved on 13-04-2008 http://www.mcmaster.ca/uts/network/vpn</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>* [3] McMaster University VPN FAQ and installation guide. Retrieved on 13-04-2008 http://www.mcmaster.ca/uts/network/vpn</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* [4] VPN in English Wikipedia. Retrieved on 13-04-2008 http://en.wikipedia.org/wiki/Vpn</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">* [5] Image 1 retrieved on 13-04-2008 http://www.checkpoint.com/products/vpn-1_clients/images/vpn-1_sc_connect.gif</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div><ins style="color: red; font-weight: bold; text-decoration: none;">--[[User:Pliassn|Pliassn]] 23:29, 13 April 2008 (EDT)</ins></div></td></tr>
<!-- diff generator: internal 2024-03-29 07:37:02 -->
</table>Pliassnhttp://wiki.cas.mcmaster.ca/index.php?title=Virtual_Private_Network&diff=3118&oldid=prev24.57.211.198: New page: A '''Virtual Private Network''' ('''VPN''') is used to create secure connections between hosts. This is accomplished through tunneling and encryption. The advantage of a VPN is an inherit ...2008-04-14T03:03:13Z<p>New page: A '''Virtual Private Network''' ('''VPN''') is used to create secure connections between hosts. This is accomplished through tunneling and encryption. The advantage of a VPN is an inherit ...</p>
<p><b>New page</b></p><div>A '''Virtual Private Network''' ('''VPN''') is used to create secure connections between hosts. This is accomplished through tunneling and encryption. The advantage of a VPN is an inherit transparency of the service. This makes it valuable to different entities on the Internet, like corporations that want to provide secure connections to its employees.<br />
<br />
== How It Works ==<br />
<br />
A VPN is possible because of two things. Tunneling and Encryption.<sup>1</sup><br />
* [[Tunneling]]:<br />
Tunneling is the process of routing information of one protocol within another protocol. In VPN tunneling, the TCP/IP datagram with a virtual destination and source addresses is encapsulated in another TCP/IP datagram with actual addresses. When the datagram arrives at the location, the inner datagram is recovered and is delivered to its virtual address (which may not be on the same machine).<br />
* [[Encryption]]:<br />
Encryption is the act of reversibly altering data to make it unreadable to non-trusted users. In VPN, the VPN datagram is encrypted, so if it is intercepted, it will provide no information to the interceptor. But since it is encapsulated in another TCP/IP datagram it has no problem of reaching its destination.<br />
<br />
== What happens when information is sent through a VPN ==<br />
<br />
1) The data is split into datagrams with the virtual VPN destination address and a virtual VPN source address.<br />
<br />
2) The datagram is encrypted.<br />
<br />
3) The encrypted mess of bits is placed into a TCP/IP datagram with actual source and destination addresses<br />
<br />
4) The TCP/IP datagram is sent over the Internet to its destination.<br />
<br />
5) If it arrives, the inner, encrypted datagram is recovered.<br />
<br />
6) And decrypted.<br />
<br />
7) And forwarded to its virtual VPN destination. The destination may be the same machine that received the TCP/IP datagram, or it may be a machine on the subnetwork. <br />
<br />
== History ==<br />
<br />
At first, when two computers needed to be connected securely, a dedicated connection, in the shape of a direct cable, was established. This approach guaranteed that no information would be intercepted by placing the cable into difficult to reach places and by controlling access to it. The problem was that such a solution was only possible for short distances, laying a dedicated cable across a city (let alone a country) was extraordinary expensive.<br />
On the other hand, during the end of the last century, there was a significant growth of the Internet. This enabled two computers virtually anywhere on Earth to be connected with a reliable and fast connection. On the other hand, the information traveling through the Internet could be easily intercepted. Because of this, there was a strive to create a virtual link through the physical network that would be protected from hampering with cryptography. This approach would be many times cheaper then creating a dedicated, physical link, and could be afforded by small companies.<br />
When the idea caught on, it was extremely popular. Many IT corporations developed implementations of virtual private networks, not just in software but also on the hardware level. For example some of the companies that provided a VPN solution are:<br />
<br />
* Cisco — L2F (LAYER 2 FORWARDING), L2TP (LAYER 2 TUNNELLING PROTOCOL), L2TPV3 (LAYER 2 TUNNELLING PROTOCOL VERSION 3)<br />
* Microsoft — PPTP (POINT-TO-POINT TUNNELING PROTOCOL)<br />
* Check Point Software Technologies — VPN-1<br />
* Redcreek Communications — Ravlin<br />
* Intel — LANROVER VPN EXPRESS<br />
<br />
This creation of many different implementations implied that there was no standard for a VPN. Many implementations had security weaknesses, weak encoding techniques and no portability. Many implementations did not go beyond beta versions, but eventually, some grew into usable solutions, like OpenVPN. Primarly, VPN implementations were focused at delivering secure information from point to point. With time, they grew into more complicated networks, like extranet VPN, intranet VPN and remote access VPN. When more people started using VPNs, there was an effort to create and manage accounts with different levels of access. Then the support for different network protocols and eventually portability issues were raised. <br />
<br />
== Classifications <sup>[http://ru.wikipedia.org/wiki/VPN 2]</sup> ==<br />
<br />
'''by type of medium:'''<br />
<br />
* Protected:<br />
Most popular type of VPNs. With these it is possible to create secure subnetworks based on a public network (Internet).<br />
These are: IPSec, OpenVPN и PPTP.<br />
<br />
* Trusted:<br />
Used in cases where a secure network is already provided and there is only a need for organizing a virtual subnetwork.<br />
These are: Multi-protocol label switching (MPLS) и L2TP (Layer 2 Tunnelling Protocol).<br />
<br />
'''by implementation'''<br />
<br />
* Hardware:<br />
The VPN is implemented with a number of dedicated hardware devices. This allows for efficiency and usually security.<br />
<br />
* Software:<br />
The VPN is implemented as a software package.<br />
<br />
* Integrated:<br />
Functionality of the VPN is provided in a package of both hardware and software that also handles packet filtering, firewall and other network services.<br />
<br />
'''by use'''<br />
<br />
* Intranet VPN:<br />
<br />
Used for creating a single protected network within a corporation between different physical locations using an unprotected, public network.<br />
<br />
* Remote Access VPN:<br />
<br />
Used for creating a private link between a segment of a corporation network and an employee that can connect to the company resources from a remote location.<br />
<br />
* Extranet VPN:<br />
<br />
Used for networks that allow "semi-trusted" users (like clients) to connect to a company network. These users are not part of the corporation and so should have limited access to the company's resources.<br />
<br />
'''by type of protocol'''<br />
<br />
There are implementations of VPNs for TCP/IP, IPX and AppleTalk. But there is a general trend toward TCP/IP and practically every implementation supports TCP/IP.<br />
<br />
'''By level of network protocol'''<br />
<br />
There are implementations that can be attributed to different levels of the OSI models<br />
<br />
== McMaster ==<br />
<br />
McMaster uses a VPN to let its students and staff to remotely connect and use the university resources. It can also be used to transfer files securely onto a university machine. For a student to connect to McMaster VPN they need to posses a MacID. McMaster recommends the use of a Cisco VPN client<sup>[http://www.mcmaster.ca/uts/network/vpn 3]</sup>, but other clients are also supported. Machines running Microsoft Windows are required to have up to date anti-virus software installed prior to connecting to the VPN.<br />
<br />
== External Links ==<br />
* [http://en.wikipedia.org/wiki/Vpn| http://en.wikipedia.org/wiki/Vpn]<br />
* [http://www.mcmaster.ca/uts/network/vpn| http://www.mcmaster.ca/uts/network/vpn]<br />
<br />
== References ==<br />
* [1] Internetworking with TCP/IP, fifth edition, Douglas E. Comer, 2006<br />
* [2] VPN in Russian Wikipedia. Retrieved on 13-04-2008 http://ru.wikipedia.org/wiki/VPN<br />
* [3] McMaster University VPN FAQ and installation guide. Retrieved on 13-04-2008 http://www.mcmaster.ca/uts/network/vpn</div>24.57.211.198