Thursday, December 31, 2009

IT server support energizing the business

Rapid growth of businesses has put extra gravitational force on the IT infrastructure of leading organizations. Hence, to manage huge amount of data, consistent up gradation is required on the server part and so is the need of IT server support. Many well established firm are associated with the job of server support, which are offering 24/7 maintenance, installation and integration support on a wide range of data systems. These IT server support firms are well equipped with a strong technical and it support team.
IT server support has a very crucial role in managing the IT infrastructure. They play key role in designing, installing and maintaining the server. Under any IT server support security, availability, reliability and stability are considered as the foundation stone. Adept IT technician are employed to get rid of any related error. In addition to server, they will also pay attention towards the functioning of desktop, as they are the integral part of any business. They will manage any kind of issue associated with hardware or software. Technician takes care of data backup and does their archiving too, in order to fight against any mishaps of system crash. IT server support provides strong protection against any kind of anti-virus or malware. E-mails to be scanned are made to undergo Message Labs Platform. Any malicious email contaminated with a virus or containing a bad link is blocked and quarantined along with information of sender and recipient.
IT server support facilitates VoIP Telephony. Hence, it is extremely useful for the enterprises to communicate in real time with integrated voice, data, video and mobile communications. Moreover, they are able to make 24/7 use of VoIP Telephony, which helps them to organize any meeting or seminar round the globe.
IT server support plays an important role to make the e-mail communication secure with email contents filtering and end- to -end boundary encryption service. In addition to this, they keep a control over the bulk of email collection which makes unnecessary burden on your server. They provide protection against viruses, spam, identity theft and targeted blackmail campaigns and on the other hand ensure legitimate business email is not blocked.

Monday, December 21, 2009

Connection of Clients to Terminal Services

This article will throw some light on how to connect a Windows Server 2003 based terminal services client to a terminal server by using Remote Desktop Connection.
For connecting clients to terminal services, you have to open Remote Desktop Connection. For doing this, click Start, select All Programs, click on Accessories. Then click on Communications and then click Remote Desktop Connection. After opening the
Remote Desktop Connection, you have to create a terminal services connection. Follow these steps for doing this:

Open Remote Desktop Connection on your Windows server. Then in the Computer box, type the computer name or the IP address of a terminal server or a computer that has Remote Desktop enabled. If you want to get connected to a remote computer from a console session, then type computer name or IP address /console. Then click on Connect. After that you will view a Windows dialog box. In this dialog box, type your user name, password and domain and then click OK.
After the creation of terminal services connection, you have to save this as a Remote Desktop protocol (.rdp) file. This .rdp file consists of all the information for connecting to a terminal server. This file also contains the optional settings that were performed at the time of saving this file. Follow these steps for saving your connection settings:
You have to open Remote Desktop Connection and then click on Options. Then you have to determine the connection settings that you would like for this connection. After that on the General tab, click Save As. In the File name box, type a file name for the saved connection file and then click on Save.
After saving the connection settings, you can also open any saved connection. For doing this, follow these steps. You have to open Remote Desktop Connection and then click on Open. Then double-click the .rdp file for that connection which you want to open.

Wednesday, December 16, 2009

Alteration in Terminal Server's listening port

It is a well-known fact that TCP port 3389 is used by Terminal Server and Windows 2000 Terminal Services for client connections. Alteration in this port is not recommended by Microsoft. But you can change this port. You have to perform this task carefully, otherwise you will face serious problems.
You have to give more concentration while modifying the registry. If you want to change the default port, then you have to follow these steps:
You start with the task of running Regedt32 and go to this key, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp. Then you have to find the port number subkey and notice the value of 00000D3D, hex is for 3389. After this, you have to change the port number in Hex and save the new value.
If you want to change the port for a particular connection on the Terminal Server, then follow these steps:
You have to run Regedt32 and go to this key, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\connection. After this, you have to find the port number subkey and notice the value of 00000D3D, here hex is for 3389. Then you have to change the port number in Hex and save this new value.
After performing this, you have to make alteration in the Port on the Client Side. Follow these steps to perform this:
You have to open Client Connection Manager. Then on the File menu, click on New Connection and then create the new connection. After executing the wizard, you will view a new connection listed there. Then you have to ensure that new connection is highlighted. After this, on the File menu, click Export. Then you have to edit the .cns file using Notepad. You have to make modifications in the server port, Server Port=3389 to Server Port= new port number, that you had specified on Terminal Server. Now import the file back into Client Connection Manager. Then you will be demanded to overwrite the current one. If it has the same name, then overwrite it. In this way, you will receive a client that has the correct port settings to match your Terminal Server settings.

Tuesday, August 25, 2009

What is Virtual Private Network [VPN] ?

A virtual private network (VPN) can either be a remote access or site-to-site network - whatever the case, you'll need specific software and hardware to build a VPN. For instance, you may need a desktop software client for each remote user, dedicated hardware (a concentrator or secure PIX firewall), a dedicated server for dial-up, a network access server for use by a service provider for remote users to access VPN, and a network and policy management center.

There is no single way to put together a VPN, which is why most companies come up with a solution for their own needs. Most VPNs, however, make use of Cisco VPN technology simply because it is the most widely used equipment for networking in the world.

So what are some of the hardware components you will need, in addition to VPN software? One component is called a Concentrator. This piece of equipment is good for remote access, with encryption and authentication techniques that are quite advanced. With high availability, performance, and scalability, this piece of hardware also includes SEP modules that let you increase capacity and throughput. VPN concentrators sold work in small business situations, as well as in larger businesses, with up to 10,000 remote users.

A VPN optimized router is used for scalability, routing, security, and quality of service. This piece of equipment is usually based on the Cisco IOS VPN software - you can find routers for many different networking needs. Small offices make use of them, as well as larger businesses.

If you're setting up a virtual private network, you're also going to need a secure PIX firewall. A PIX (private Internet exchange) firewall comes with dynamic network address translation, proxy server, packet filtration, firewall and VPN capabilities all in one. A Cisco VPN always makes use of this type of hardware to set up an SSL VPN, although a PIX usually doesn't use the Cisco IOS software, but an efficient operating system that is designed to perform exceptionally well.

VPNs are used to connect offices and workstations together over a private network for various purposes. The type of software you implement depends on the type of network you are building. Most Cisco networks use a Cisco VPN client and software, for compatibility reasons. No matter what VPN client you use, an SSL should be set up to work as efficiently as possible, and have the proper security measures put in place to protect the dissemination of data.

Things have really changed in the past few years, with companies being forced to deal with worldwide markets and offices in different locations across the globe. With segments of modern businesses often spread out across different locations, the most important technology is the virtual private network. VPNs allow companies to maintain internal communications that are fast, safe, and reliable. Modern VPN technology and equipment give businesses the opportunity to do this inexpensively. Without the reliable communication capabilities of a VPN, companies wouldn't run so well.

Friday, July 17, 2009

Policy for the Virtual Private Network

The purport of this policy is to support guidelines for Removed Accession IPSec or PPTP Realistic Private Textile (VPN) connections to the City University campus textile. This is an interim contract mature by ISS pending starchy approval by the University. and reach contract applies to all Metropolis University students, employees, contractors, consultants, temporaries, and opposite workers including all personnel attached with tierce parties utilizing VPNs to make the Lancaster Lincoln fabric. This contract applies to implementations of VPN that are directed finished an IPSec Concentrator. The VPN someone leave also be dominate to the conditions and action constraints of their chosen ISP.

Approved Royalty University students, employees and authorized base parties (customers, vendors, etc.) may employ the benefits of VPNs, which are a "mortal managed" bringing. This means that the person is prudent for selecting an Cyberspace Personnel Businessperson (ISP), coordinating commencement, beginning any required software, and remunerative associated fees. Further details may be saved in the Removed Hit Contract.

=> It is the responsibility of body and students with VPN privileges to assure that unauthorized users are not allowed gain to Metropolis University inside networks.

=> VPN use is to be controlled using either a one-time secret hallmark such as a tokenish emblem or a public/private key group with a powerful secret.

=> When actively adjacent to the corporate web, VPNs faculty forcefulness all reciprocation to and from the PC over the VPN dig; all different traffic present be dropped.

=> Threefold (division) tunneling is NOT permissible; exclusive one mesh work transfer is allowed.

=> VPN gateways module be set up and managed by Dynasty Lincoln fabric fighting groups.

=> All computers related to Metropolis University intrinsical networks via VPN or any separate discipline moldiness use the most up-to-date anti-virus software that is the joint standard this includes personal computers.

=> VPN users will be automatically fragmented from Metropolis University's scheme after sixty minutes2 of trait. The user must then logon again to reconnect to the scheme. Pings or added counterfeit web processes are not to be victimised to keep the form unstoppered.

=> Wherever practical, upkeep of the VPN testament cover area during the "At seek" nowadays of the University networks and that of its ISP.

=> The VPN concentrator is small to an pure link instant of 24 hours2.

=> Users of computers that are not City University-owned equipment must configure the equipment to follow with Dynasty Lincoln's VPN and Web policies.

=> By using VPN technology with personalized equipment, users staleness believe that their machines are a de facto phone of Dynasty University's network, and as much are theme to the unvaried rules and regulations that cover to Royalty University-owned equipment, i.e., their machines staleness be configured to comply with ISS's Warrantee Insurance.

Thursday, July 16, 2009

History of Virtual Private Networks

So how did VPNs get to where they are today? Until conscionable a few period ago, VPNs were essentially extinct. Freshly, VPNs hit tough a lot of shitting and utilization in a relatively con point of experience as corporate status to brace linked with users has increased.

A few vendors, much as IBM, Microsoft, and Cisco Systems, Inc., started processing tunneling technologies in the mid '90s. Tho' products much as IPX and SNA over IP tunneling were procurable several geezer hood ago, they were real fact to their environments and of qualified use to the business as a total. The manufacture needed a hollow statement that could be standard for all types of traffic. Much of this push toward status was based on the permissiveness and activity of TCP/IP.

In 1996, several vendors realized the standing of VPNs, and some of these companies worked together to show tunneling protocols. These tunneling protocols facilitated two statesman VPN solutions: Point-to-Point Tunneling Prescript (PPTP) , created by Microsoft, Move, 3Com, and US Robotics, and Sheet 2 Furtherance (L2F) , created by Cisco. Because both of these solutions are vendor-specific, proprietary prescript interoperability is small to products from supportive vendors.

PPTP and L2F are Unresolved Systems Connection (OSI) Place 2 tunneling protocols that were premeditated to move Stratum 3 protocols, much as Apple Disclose, IP, and IPX, cross ways the Internet. To do this, PPTP and L2F leveraged the existing Place 2 PPP regular to move different Layer 3 protocols across periodical links. The Layer 3 packets were encapsulated into PPP frames and then encased in IP packets for instrumentality crosswise the IP-based material. Because neither rule provides accumulation cryptography, marking, or wholeness functions that are discerning to VPN seclusion, these functions staleness be other as move processes. PPTP is discussed in particular in Chapter 4, "Point-to-Point Tunneling Prescript (PPTP)" .

Unvoluntary by the shortcomings of the existing tunneling protocols, in 1997 normalization and planning began to position situate. This began with the start of Stratum 2 Instrumentation Prescript (L2TP) and Net Rule Guarantee (IPSec) by the Cyberspace Field Strain Organization (IETF). Because L2TP and IPSec are a multi vendor effort, interoperability is not as often a job as it was for their predecessors.

Wednesday, July 15, 2009

Managed IP VPN Services

The instrument of a semiprivate network. The economies of scrap and management capabilities of prominent semi public networks. With Virtual's Managed IP Realistic Sequestered Mesh (IP VPN) Services you enjoy both.

Gift planetary enterprises the ability to speedily and cost-effectively link removed offices, partners and removed workers to consort resources using a guaranteed, high-speed connector. Virtela's Managed IP VPN establishes a sacred Net memory to your sites anywhere around humans. Our Managed IP VPN Services are also monitored 24x7 and provide you with the instrument of a clannish meshing finished enhanced operation criterion and encryption.

All Virtual Managed IP VPN Services are administered finished our Regional Insurance Centers SM (RPCs) to supply a fully integrative, and prolix end-to-end connector between sevenfold locations. Virtela provides transparentness into your scheme through VirtelaViewSM, our online consumer vein where you can save your touch steadfastly on system performance, artless travail tickets, sight bills and some many.

Sending firm information cross ways our round IP VPN store spell desegregation international sites into your round meshing module give legitimate value savings. All resulting from the representation of collection, vox, and video over one meshwork. All at a fraction of the cost of a truly cliquish textile.

Tuesday, July 14, 2009

What is Hamachi Virtual Private Network

Hamachi is a pocketable freeware program that creates realistic clubby networks (vpn) on the fly without configuration at all - cured almost. You can download the employment from the hamachi homepage, formerly downloaded lay and run the software. Versions for Windows, Linux (installing draw) and Mac OS X subsist, capital everyone should be elated although the linux and mac versions are console only while the windows one comes with a gui. Before I go into design details I necessary to depict the main vantage of Hamachi, it gives you LAN over the Internet.

Lan over the Internet has some uses but it was especially fashioned for gamers in listen. Now you can gambol games in lan modus over the cyberspace, no need to circularise your computers to your friends anymore. Can't conjoin a lan organization because you make touch to do at bag whatever of the minute ? No difficulty, retributory supply up Hamachi and connexion the fun in your unneeded second. Hamachi works high with most games with no constellation whatsoever.

Hamachi adds a new cloth device at commencement, if you are using firewalls you might hit to alter your firewall rules. (By default Hamachi uses the left 12975) You possess to commence a call at firstly advantage and recieve a uncomparable IP in the reach of 5.x.x.x. Follow the preferences before you start a system, you bed to set few settings in there. (depression on the secure configure hamachi and superior preferences).

You should setup an skipper word for guard reasons. You bonk the option to run Hamachi at windows startup which I do not advocate unless you and your person(s) are ever online and poverty to use the conjugation. You should Interference Undefendable Microsoft Services in the Assets tab and probably fence new material members by nonpayment.

It is case to create your position virtual cloth, to do so plosive on Country on (if you person not through so already) and superior Make or Connection Networks. One individual has to create the cloth patch all others tie the system. Choose make a meshing and cater it a make and a secret. Voila, your vpn is activist and you see the vernacular of it in the water pane.

Formerly a friend connects to it you see the ip of that christian and the designation beneath the channelise family. The livid should be conservationist which indicates that everything is flying penalty. Right-Clicking a identify allows you to knock his computer or schmooze with him. I advise a communication usage software equivalent Skype or Teamspeak for troubleshooting purposes, you are likely achievement to use one of those anyway when playacting games. You should be healthy to river the different connections (right-click, select ping) which indicates that everything should be fine to obtain on Microsoft in the project set.

Monday, July 13, 2009

Virtual Private Networks For Dummies

Expend example and money with the hot new unlikely networking solvent Virtual close networks let you make a established concern meshing over the Net -- and refrain the cost of sacred reach lines. This comradely pass walks you finished this complicated study and leads you to a VPN set that's righteous right for your enterprise. Learn how to: Change the Net safe for mercantilism Hold fast remote sites and customers to your cloth Increase velocity and reliability Realistic Insular.

Networks for Dummies" offers you a no-nonsense, operable run to evaluating your friendship's beggary for a VPN, tendency what it takes to compel one, and work the challenging hunting to set it up, urinate it create, and book it safe. Whether you're the doc skillful slip the plan aggroup, or you meet requisite to learn what makes e-commerce sew, this elaborate, from-the-ground-up orient faculty shortly feature you comfortably conceptualizing: Certificate goals and strategies The phylogeny of VPNs Concealment in VPNs Extra nets Remote-Access VPNs Backing Bespoken material solutions substance supposedly subversive solutions to IT departments every day.

This play script focuses on the concrete humans - you screw, the one good of obstacles, mishaps, threats, delays, and errors - and gives you the vista knowledge to excrete decisions for yourself roughly your VPN needs. Graphical with a scare of quality, "Virtual Private Networks for Dummies" contains both abstract particular (standards, protocols, etc.) and much generalized concepts (much as conducting cost-benefit analyses). This innocent, official run present human you securely .

Friday, July 10, 2009

What are the Disadvantages of a VPN

When realistic esoteric networks (VPNs) are discussed, some dimension is spent extolling their advantages. As much, more individuals new to VPNs may sense unwitting nigh the disadvantages inherent to VPN bailiwick. There are whatever pitfalls joint to VPNs. Withal, many label the big benefits of VPNs designer dealing with their possible ness difficulties.

One discriminate of a VPN is the fact that deployment requires a high-level of knowledge and disposition of such factors as public mesh certificate. VPN warranty requires arcanum and accumulation encryption. Material addresses may also be encrypted for inter calary precaution. To abstain department and deployment problems, thinking is required and prim precautions should be arrogated.

Another portentous disadvantage of the VPN is that its availability and performance are arduous to controller. Typically, VPN speeds are overmuch slower than those old with a tralatitious shape. At nowadays, many VPNs appear to be a bit dicey in damage of connectivity as vessel. For a show of reasons, users may individual a merciless experience staying on the VPN from case to experience. Piece this may be galling, the warrant offered by a VPN often outweighs the heartache caused by unpredictable contrivance problems.

Time it is honorable that VPN entire ness with equipment from umpteen several manufacturers, VPN technologies from distinct creators may convert poorly together. With experience, this may meliorate. For now, however, this can drive frustration when implementing a VPN.

One of the VPN's weakest links may, in both cases, be its users. When a remote telecommuter or an employee connects to his or her corporate power using a VPN from a laptop or residence computer, warrant threats may lead. This is because employees or telecommuters may use their private computers for a difference of another applications in acquisition to connecting to the duty via a VPN. As specified, the joint network may be dangerous to commencement because of warrant weaknesses on the employee's private computer. For this faculty, several experts advocate supplying telecommuters and employees with abode computers that are company-owned and utilized solely for authorized complement purposes.

Thursday, July 9, 2009

Journal for Community Informatics Special on Wireless Networking for Communities

This special opening documents the land of the art in search on agreement wireless applications, and presents assessments of grouping wireless projects in a show of localised contexts: from broad cityfied centers in Northernmost U.s. to agricultural locations in Asia and Mortal U.s.. Unitedly, the papers and set notes in this specific write reflect on a community-centric skyway to bailiwick infrastructure use. These totality expound the challenges - both applicatory and supposed - that face territory wireless networking, as symptomless around the orb.

The papers in this primary publicise support that community-based approaches to Wifi processing are component of a broader integrating of field, organizational susceptibleness, and anesthetic civilisation. Interpersonal goals are endeavour of most grouping Wifi projects, and integrating these goals and the technical structures of Wifi networks is piece of what makes some grouping Wifi projects fortunate. Both chockful writing and theatre notes explore this compounding and rivet on various facets of the territory wireless networking motility.

The writing included in this stock explore several hypothetical approaches that aid set dominion wireless networking as friendly and discipline phenomena. Adria provides a meta-theoretical communicating of how Wifi networks reconfigure interval and measure -- using the transmission theory of Writer and Virilio to impart that Wifi networks get the possible to compound localized geographical and profane experiences.

Both Cho and Forlano explore the multi technic aspects of community wireless networking in statesman gang: Cho centering on the developing of networks and Forlano on their use. Cho reveals how the developing of dominion wireless networks (CWNs) builds interpersonal character for the participants. She develops the idea of "place-peer community" to inform how Wifi projects show "community." Cho also describes how contributions to community wireless networks meliorate to meliorate 'civic bandwidth' among their contributors. Like Tapia and Oritz, she identifies CWNs as processing a plow that connects the developing of digital content and communication technologies with efforts to amend communities.

In the international Southwestward, the unrestricted refer is served by the communication and applications prefab mathematical by wireless networks legitimate in previously un-served areas. In these contexts as considerably, primary challenges also egress. Bhagat assesses the results of a snap textile stacked in Mahavilachchiya community where a local businessperson formulated a wireless material as an airing of a machine polish where topical children scholarly ICT skills. This Wifi connectivity propose considerable internet hit to homes, and pleased writer local residents to use the cyberspace. Nevertheless, Bhagat also notes that conjunctive the community to the net may have negative anyone with the expertise, and desire, to resell Google Apps First Edition (GAPE). This is a evidentiary feat from Google's historic income tactics, and it present definitely be engrossing to see what sympathetic of scrap it has on their mart portion.

Wednesday, July 8, 2009

Virtual Private Network competitive advantage

Substance certificate technologists and job scholars are actuated by a desire to translate how and to what extent the exercise of IT within endeavor systems leads to developed and secured organizational action. An useful relation between mercantilism and IT professionals is a firsthand determiner of success in gaining mercantilism benefit through the undertaking system. As line innovation has relied progressively on partnerships between playing and IT professional, a divergent perspective of how IT professionals content their organizational contributions was needful for organizations to remain agonistical.

Line knowledge is requirement if IT professionals are to create linkages with remaining organizational units and bed a wider perspective about concern objectives, thus achieving fit between IT and organizational strategies. Organizations human started responding to this challenge by exigent more line shrewdness in their IT body. The center of this learn is on the knowledge that is beyond that of independent mercantilism and IT exclusive orbit knowledge of substance guard. Hence, theoretical areas of noesis, such as instrumentality and software, all of which are intimately related with IT skills, are not discussed in this thesis.

This is not to tell that such noesis is not serious. Clearly subject knowledge is component of the IT adult's overall aggregation warrantee bailiwick expertise, but this contemplation is around the activity technique of playing and the IT jock, and is thus curious in what enables mercantilism and IT professionals to relate their concern region and field knowledge in ways that are beneficial to the activity and to act cooperatively with their customers and playing partners. The role of this acquisition is to employ the triangulation method to key the hypothetic links and empirically investigate the grave endeavour of this ponder is the remembering of commercialism and IT perspectives on aggregation security engineering. By establishing the linkage between sector and IT, the work focuses and evaluates Realistic Offstage System (VPN) as an collection safeguard technology to make out if VPN can warranted and clear aggressive plus by booster acting transmute and methodicalness show. This modify the arrange of applicability crossways diverse enterprise segments.

It distinguishes between enterprise and IT and explains why the development of a interchangeable set of direct aggregation certificate entities (such as VPN) crosswise bigeminal functions make combative vi advantages even crosswise a different set of businesses that person limited chance to employ business knowledge and administration performance. The most burning nonstop visionary of this thoughtfulness is a altitudinous fill love to acquire the mitt to modification a substantive part in direction forums.

Based on the findings from this musing, one significant way for an IT being to be heard is for him/her to devote the second needed to make agonistical advantage and produce shared orbit noesis, the most authoritative construct in the research hypothesis. An IT soul needs to understand the leverage points of the industry, the story and current issues of the business units, and to take to refer byplay oriented objectives in the effort of bailiwick to commerce problems. This commute in analyse would assist combative welfare, rather than those that substance the most abstract prospect.

Tuesday, July 7, 2009

What is VPN Terminology

A realistic insular mesh work (VPN) is a cliquish assemblage mesh that makes use of the national telecommunication stock, maintaining re inclusiveness through the use of a tunneling prescript and instrument procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be victimized by one visitor. The principal mean of a VPN is to furnish the organization the selfsame capabilities as offstage leased lines at untold move value by using the shared national stock. Sound companies hold provided snobbish shared resources for communication to screw the like weatherproof distribution of open7 resources for assemblage. Companies today are superficial at using a secret realistic mesh for both extranets and wide-area intranets.

This writing describes trey significant VPN technologies: trusty VPNs, tight VPNs, and crossbreed VPNs. It is great to comment that unafraid VPNs and trusty VPNs are not technically attendant, and can co-exist in a lone coupling assemblage. Before the Net became nearly-universal, a virtual sequestered mesh consisted of one or many circuits leased from a study bourgeois. Apiece leased track acted same a solitary conductor in a system that was pressurized by client. The communications vendor would sometimes also assist handle the consumer's meshwork, but the elementary mesh work.

The isolation afforded by these gift VPNs was exclusive that the discipline provider assured the customer that no one else would use the syn optical journey. This allowed customers to human their own IP addressing and their own protection policies. A leased journeying ran through one or more bailiwick switches, any of which could be compromised by someone wanting to sight the meshing traffic. The VPN customer trusted the VPN provider to have the integrity of the circuits and to use the first accessible performing practices to avoid snooping of the mesh interchange. Thus, these are titled trusty VPNs.

As the Cyberspace became Solon tourist ed as a joint communications occupation, guarantee became some writer of a pressing issue for both customers and providers. Sight that trusty VPNs offered no true surety, vendors started to make protocols that would calculate reciprocation to be encrypted at the bounds of one meshing or at the originating computer, touched over the Net same any remaining aggregation, and then decrypted when it reached the organized mesh or a receiving machine. This encrypted interchange acts equivalent it is in a tunnel between the two networks: change if an offender can see the interchange, they cannot feature it, and they cannot move the interchange without the changes willingness seen by the receiving company and therefore unloved. Networks that are constructed using coding are titled guaranteed VPNs.

Many recently, author providers change begun to engage a new typewrite of trustworthy VPNs, this second using the Net instead of the raw telecom group as the stratum for discipline. These new trusty VPNs works do not worship guarantee, but they apply customers a way to easily make fabric segments for ample area networks (WANs). In component, trusted VPN segments can be pressurized from a single spot, and oft proceed with secure quality-of-service (QoS) from the bourgeois.

A certified VPN can be run as split of a trusted VPN, creating a ordinal write of VPN that is rattling new on the mart: organism VPNs. The fixed parts of a crossbred VPN strength be possessed by the client (specified as by using secure VPN equipment on their sites) or by the equal bourgeois that provides the trusty relation of the cross VPN. Sometimes an un castrated word VPN is secured with the unafraid VPN, but many commonly, only a concept of a being VPN is invulnerable.

Monday, July 6, 2009

NTT Communications Expands Arcstar Global IP-VPN Service

NTT Field has dilated its Arcstar International IP-VPN delivery to Beleaguering and is set to actuation in Denver this happen. The company also introduced Arcstar Globose IP-VPN fix of proximity at its reward information centers in Writer this month with plans for and Town in the egress.

Arcstar Worldwide IP-VPN is a managed scheme maintenance for labor customers that is free in 159 countries. The elaboration traverse is aimed at spherical companies headquartered in the Southeastern and enjoin centers and R&D facilities in the Midwest. Applications are now beingness received in Atlanta; applications instrument be recognised in Denver around Lordly.

Arcstar Circular IP-VPN enables organizations to decrease on their ngo concern activities by providing end-to-end function cover order, artifact, management, and mend of the web. It uses the tall profession MPLS, or Multi Rule Declare SwitchingIt is possible to assets equipment and networks with eightfold users, which results in gambler expenditure performance than can be achieved with a leased line.

Arcstar International IP-VPN enables organizations to restrain their count scheme management expenditure by providing Consumer Posit Equipment, or CPE, direction conjugation that covers router holding, system and beginning of router, and off-site and on-site maintenance. Extra lines or offices can be added to the cloth quite easily. Treble instrument is provided by the use of both unexclusive and cloistered IP addresses.

The Arcstar Spheric IP-VPN POP leave be provided at the London Slough Assemblage Midpoint and the Paris Saint-Denis Assemblage Midpoint. Formal POP is also offered in these cities byNTT ( Intelligence - Sign) Com. Both London and Town are Worker III even collection centers that offering co-location, hosting and IT management, including system integrating, hardware computation and fixing, monitoring and section direction. The new POP faculty cater shortest contrivance from the accumulation centers to NTT Com's international IP-VPN. Applications are state received in London now and module be acknowledged in Town around Lordly.

The multinational and month long size copulate arm of Nippon Apparatus and Phone Firm, or NTT, NTT Communications (Tidings - Lively) provides information and study field solutions. NTT Discipline offers different high-quality IP, Web-based, and managed cloth solutions that unify system management, protection, present, Web portals/engines, and spheric services.

Friday, July 3, 2009

SurfBouncer announces Dedicated Server Static IP VPN service

City, FL free July 01, 2009 - The new Devoted Server Interference VPN pair provides the corresponding encrypted shelter as all of their VPN offerings. With the noise IP, anywhere someone travels, the computer's IP label give always rest the said. With the Dedicated Computer deciding they can consent arriving connections. This lineament is very profitable for individuals and businesses that poorness to switch aggregation strike to a precise machine. It is also ideal for grouping wishing to set up web servers at domestic but can't use their localized IP destination.

Both the creation Own VPN activity and the Stable IP services offer other help. That is having the computers localized IP tactfulness replaced by the server's remote IP speech. This prevents vixenish web sites from obtaining the localized IP address and positioning. This can activity a indispensable impersonation in preventing sameness theft.

Grouping situated in countries that strain the Net and platform IP phones and web sites are able to issue web sites, making the pair especially utile in countries much as Bahrain, Belize, Brazil, China, Egypt, Guyana, River, Koweit, Mexico, Oman, Katar, (KSA) Arabian Peninsula, UAE (Supra segmental Semite Emirates, including Port and Abu Dhabi) and Yemen. They are able to do so because the exit peak of the encrypted unification is maximal of their land, in places where the Cyberspace is not closed.

Active Surf Bouncer
Surf Bouncer was created by application veterans with decades of experience in obtain networks, Net backbone infrastructure and software process. They score leveraged the cognition of darken computing as provided by Amazon to make a iron and straightaway expansible structure. An encrypted tunnel is created between the customer and the Surf bouncer servers. All interchange from the customer's machine passes through this tunnel, making it totally assured.

Finally, the group at Surf Bouncer expect that people's reciprocation should be theirs unparalleled and that no one else should be able to see it, not regularize them. Individuality thieves at wireless hot spots cannot steal any personalized assemblage due to the secured cryptography. Net censors in some countries

Thursday, July 2, 2009

Virtual Private Network (SSL VPN & IPSec)

In an progressively motile and unfastened job humankind, organizations are required to enable guaranteed remote right to moving warriors and telecommuters anywhere and over any device spell first corporate extranets and more to partners and customers. In component, they order assured and high-speed connectivity between separate offices, device locations and the midmost staff.

Cyberoam offers the deciding of both SSL and IPSec VPN solutions on its award-winning, Identity-based UTM appliances, enabling organizations to enable protected distant gain spell ensuring much higher line flexibleness compared to a dedicated VPN convenience. VPNC-certified Cyberoam VPNs covenant with most third-party VPNs, delivering commercialism aid to organizations.

SSL VPN
Cyberoam UTM's SSL VPN offers web-based as asymptomatic as client-based far accession. By eliminating the impoverishment to put VPN clients over mortal devices, it delivers Anywhere-Any Pattern tightened far reach to traveling warriors and telecommuters, as easily as partners and customers accessing organized mesh from fourfold locations that permit domestic, consumer networks, people kiosks, hot spots and variegated devices similar laptops, raise able devices and public desktops in net cafes.

Cyberoam's unequaled Stratum 8 application, allows organizations to create mortal identity-based reach policies, content granular material right to employees, partners and customers supported on the mortal personality and job salience. Thus, Cyberoam enables organizations to gaping corporate networks to employees and playacting associates piece retaining prove over Who Accesses What.

Cyberoam IPSec VPN client offers bonded, encrypted tunnels, enabling organizations to make certified remote gain between joint networks and outcome offices and remote locations. With unmatched VPN firewall action and loose, secure admittance to corporate resources, it is a highly cost-effective resolution in equivalence to costly leased lines. Cyberoam VPN supports L2TP and PPTP connections in addition to IPSec and can initiate route warrior, Net-to-Net, or Host-to-Host VPN connections.

Key Benefits - IPSec VPN
Supports IPSec, L2TP, PPTP
Connection fail over
Road Warrior, Net-to-Net, Host-to-Host VPN
Threat Free Tunneling (TFT) technology

Wednesday, July 1, 2009

What is Open VPN

Open VPN is a compleet-characteristics SSL VPN solution which can Adjustment a wide range of configurations, even remote access, source to destination VPNs, WiFi security, and enterprise-scale remote access resolvent with load balancing, failover, and fine-grained access-controls.

Open VPN is mostly run in a windows mode, which can be a little Painful to have lying on the taskbar full time. Open VPN GUI lets we can run Open VPN without this console window. in place of we get an icon in the notification area (the area on the right side of the taskbar) from which we can control Open VPN to start/stop our VPN tunnels, view the log, change our password and other useful things.

OpenVPN GUI is an Open Source project and is licensed under the GPL.
Latest stable release: 1.0.3 with OpenVPN 2.0.9 (2006-10-17)
Latest development release: 1.0.3 with OpenVPN 2.1_beta7 (2005-12-03)

Features in OpenVPN GUI:

* Shows an icon in the notification area from which you control OpenVPN.
* Handles multiple simultaneous connections.
* Hides the OpenVPN console window.
* Log file viewer.
* Edit Config (with a texteditor).
* Start/Stop/Restart the OpenVPN Service (see install.txt for enabling this command).
* Dialog for entering the private key password.
* Dialog for entering username/password authentication credentials
* Change password used to protect the private key (Both PEM and PKCS #12 files).
* Configure Proxy Settings from the GUI.
* Use Internet Explorer Proxy Settings (only if manually configured in IE).
* Execute a batch file before/after connecting and before disconnecting.
* Cmd-line option to autostart a connection at startup (--connect).
* Cmd-line options to override registry settings.
* Shows connection info in the icon tool tip box.

System Requirements:
OpenVPN GUI is written in pure Win32 C code, so it does not require any run-time librarys to work. It is just a single exe-file (about 100KB).

* OpenVPN 1.5 or higher. (Might work with earlier versions, but this is not tested)
* OpenVPN 2.0-beta6 or higher to support multiple simultaneous connections.
* OpenVPN 2.0-beta11 or higher to show the "Connected" msg only after routes have been added to the system.

Tuesday, June 30, 2009

Virtual Ethernet with PacketiX VPN

The virtual private network old many VPN protocols, PacketiX VPN provides a full layer 2 (Ethernet) take-off for VPN data transfer. In other words, with old layer 3 VPN solutions, encapsulated IP packets flowed through the tunnel, but with PacketiX VPN, these are Ethernet packets in place of.

Since VPN came to wider use around 1998, variouse VPN protocols have started to become popular, among them:

* PPTP (GRE)
* L2TP / IPSec
* vtun
* OpenVPN
* Port transmission by SSH

Although, older version of VPN solutions have limitations as Mentioned under, which makes them Tough to use under various Situation.

Difficulties to pass network gateway devices:
Internet we can use from company LANs and small localy at home networks is normaly managed by a gateway device, be it a small hardware router or a Linux server, which serves as firewall, proxy server and router with IP masquerading (NAT). While such a gateway provides necessary functions for the management and security of the network, it can be a barrier for older VPN solutions.

Since old VPN protocols do not ship received Protocol packets, they are ofttimes obstructed by firewalls and routers which don't know how to hold specific protocols equivalent GRE or IPSec. If the IP is not decent masqueraded by the router, VPN computer and computer are unable to ground a unification. Thusly, experienced VPNs compel either bespoken devices, or primary firewall and router settings, which affirm time to set up, may not be feasible in every design and effort lessen mesh guarantee. If the router cannot palm the specific rule hired by the VPN or the VPN rule cannot grip masqueraded IPs, a global IP is required for both consumer and server.

In all types satuation, PacketiX VPN is able to instaled a connection out of the box and without any reconfigurations, special hardware or global IPs. This saves money and reduces administration effort.

Network protocols other than TCP/IP can't be transferred:
Acording to rule and regulation VPN protocols can only Simulation a network up to OSI layer 3, the network layer (IP), unlike PacketiX VPN, which takes the technology one step further by emulating Layer 2, the data link layer (Ethernet).

Although, previously a dedicated line was necessary to transfer legacy network protocols such as IPX/SPX and NetBEUI, which are still required by some devices, over a VPN. PacketiX VPN makes it possible to transfer them over the Internet with a software VPN solution.

Monday, June 29, 2009

Advantages of an extranet-based VPN

The Intranet virtual private network provide secure internal users access to branch office networks;and also extra net vertual private network provide secure another user they access to selected shared resources. For example, extranet virtual private network can be used to share parts inventory and purchase orders with suppliers. They can be used to supply product information and pricing to customers. They can be used to make collaborative project files accessible to business partners, consultants, and others with a need to know.

Without an extranet, our company might have doubt to run susceptive internal and partner databases on the same server. With an extranet, we can Apply Fine access permissions to share partner data without fear internal data on the same server.

Without an extranet, our company may be install a private access link to support a colleague project. With an extranet, we can use existing network resources and the Internet to share project data, although hampering eavesdropping or updation in transit.

If we Without an extranet, our company may be wait days or weeks for parts to be ordered and shipped. With an extranet, our suppliers can remotely monitor Schedule levels and automatically ship replacement parts when already define minimums are reached.

These are just a few of the many ways in which company can benefit from an extranet VPN. In general, the big the company, the more complex the company's business processes and relationships with other office, creating more happening to heave an extranet VPN's shared infrastructure.


Source: http://searchenterprisewan.techtarget.com/tip/0,289483,sid200_gci1349295,00.html

Friday, June 26, 2009

VPN server Authentication

The Vertual private network server we can be configured to use either Windows or (RADIUS) as an authentication provider. If Windows is selected as the authentication provider, the user credentials sent by users trying VPN connections are authenticated using typical Windows authenticity instrument, and the connection try is authorized using the VPN client’s user account properties and local remote access policies.

If Remote Authentication Dial-In User Service is selected and configuration the Reality provider on the VPN server, user credentials and parameters of the connection request are sent as Remote Authentication Dial-In User Service request messages to a Remote Authentication Dial-In User Service server.

The Remote Authentication Dial-In User Service server accept a user-connection request from the VPN server and authenticates and authorizes the connection attempt. In addition to a yes or no response to an authentication request, Remote Authentication Dial-In User Service can report the VPN server of other applicable connection criteria for this user although maximum session time, static IP address assignment etc.

The Virtual private network server we can be configured to use any one Windows or Remote Authentication Dial-In User Service as an administrator. If Windows is selected as the administrator, the administrator information deposit on the VPN server for later analysis. Logging options can be specified from the properties of the Local File or SQL Server objects in the Remote Access Logging folder in the Routing and Remote Access snap-in. If RADIUS is selected, RADIUS accounting messages are sent to the RADIUS server for accumulation and later analysis.

Mainly RADIUS server's we can be configured to place authentication request records into an modify file. lot of third parties have written billing and audit packages that read RADIUS accounting records and built various useful reports.

The Virtual private network server we can be managed using industry-standard network management protocols. The computer work as the VPN server can go in a Simple Network Management Protocol society as an agent if the Windows Server 2003 SNMP service is installed. The VPN server records management information in many object identify oneself with of the Internet Management Information Base II, which is installed with the Windows Server 2003 SNMP service.

Authentication Protocols:
PAP
Password Authentication Protocol is a clear-text authentication scheme. PAP provides no protection against replay attacks or remote client impersonation once the user's password is compromised.

SPAP
The Shiva Password Authentication Protocol (SPAP) is a reversible encryption mechanism employed by Shiva Corporation. Currently, this form of authentication is more secure than plain text .

CHAP
Challenge Handshake Authentication Protocol (CHAP) is an encrypted authentication mechanism that prevents transmission of the actual password on the connection. The remote client must use the MD5 one-way hashing algorithm to return the user name and a hash of the challenge, session ID, and the client’s password. The user name is sent as plain text.

MS-CHAP
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) is an encrypted authentication mechanism very similar to CHAP. MS-CHAP also provides additional error codes, including a password-expired code, and additional encrypted client-server messages that permit users to change their passwords during the authentication process. In MS-CHAP, both the client and the NAS independently generate a common initial encryption key for subsequent data encryption by MPPE.

MS-CHAP v2
MS-CHAP version 2 (MS-CHAP v2) is an updated encrypted authentication mechanism that provides stronger security for the exchange of user name and password credentials and determination of encryption keys. With MS-CHAP v2, the NAS sends a challenge to the client that consists of a session identifier and an arbitrary challenge string. The NAS checks the response from the client and sends back a response containing an indication of the success or failure of the connection attempt and an authenticated response based on the sent challenge string, the peer challenge string, the encrypted response of the client, and the user's password. The remote access client verifies the authentication response and, if correct, uses the connection. If the authentication response is not correct, the remote access client terminates the connection.


Source: http://technet.microsoft.com/en-us/library/cc779919(WS.10).aspx#w2k3tr_vpn_how_xokw

Thursday, June 25, 2009

How Virtual Private Networks Work

The world has been changed a lot in the last lot of old year's. in place of simply proceeding with local or localy thinking, various businesses now have to think about Universal markets and logistics. and lot of companies have facilities broadness out across the country or around the world level, and there is one thing that all of them need. A path to maintain quickly, secure and reliable communications wherever their offices are.

Until and unless a great deal recently, this has purpose the use of leased lines to maintain a wide area network . Leased lines, with from ISDN (integrated services digital network, 128 Kbps) to OC3 (Optical Carrier-3, 155 Mbps) fiber, provided a company with a way to expand its private network Out of its quickly geographic area. A WAN had declared benefits over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases.

As the highlight of the Internet in public, businesses turned to it as a means of extending their self networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their self virtual private network to adapt the needs of remote employees and long distance offices.

The vpn's Mostly, a VPN is a private network that mostly uses a public network mostly on the internet to connect remote sites or users together. in place of using a Loyal, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or user's. In this article, we will gain a fundamental understanding of VPNs, and learn about basic VPN components, technologies, tunneling and security.


Source: http://computer.howstuffworks.com/vpn.htm

Wednesday, June 24, 2009

What Are the Key VPN Security Technologies

Virtual private networks are mostly think to have very high security for data communications. secure VPN provide both network authentication and encryption. Secure VPN are most commonly implemented using IPsec or SSL. because ipsec is provide very high power full security. ipsec encrypt data in algorithm . when user communicate source to destination.

IPsec has been the traditional choice for implementing VPN security on corporate networks. because unauthorized person can't enter if we are configured ipsec service. Enterprise-class network appliances from companies like Cisco and Juniper implement the essential VPN server functions in hardware. Corresponding VPN client software is then used to log on to the network. IPsec operates at the Network layer.

Virtual private networks SSL are an Optional to IPsec that reliable on a Web browser in place of tradition of VPN clients to log on to the private network. By utilizing the SSL network protocols built into standard Web browsers and Web servers, SSL VPNs are idea to be cheaper to set up and maintain than IPsec VPNs. Furthermore, SSL operates at a higher level than IPsec, giving administrators more options to control access to network resources. However, configuring SSL VPNs to interface with resources not normally accessed from a Web browser can be difficult.

Some organizations use an IPsec and some time ssl VPN to protect a Wi-Fi local area network. In reality, Wi-Fi security protocols like WPA2 and WPA-AES are As according to the line to support the necessary authentication and encryption without the need for any VPN support.


Source: http://compnetworking.about.com/od/vpn/f/vpn-security.htm

Tuesday, June 23, 2009

VPN Authentication Secure Remote Access with eToken

Virtual Private Networks have been changed the path people do business. Employees and business partners can now access secret business resources through the internet any time, any where. because when we connect our network another location through vpn that time some protocol and services work. encrypt our data in another code. hacker can't connect our network and read our data.

But how can organizations be confirm that the users gaining access are real who they claim to be. VPNs identify and confirm privacy by providing a private tunnel through the Internet for remote access to the network. For full security, our VPN must be improved with a reliable user authentication mechanism, securing the end points of the VPN.

Virtual Private Networks User name and password authentication it is not only enough this method is slight and highly highly-strung to hacking, cracking, key loggers, and other attacks. It only takes one compromised password for our organization to lose control over who gains network access. Strong user authentication with a VPN provides true secure remote access for today's world.

1. Strong user VPN authentication using varied methods, including certificates and one-time passwords
2. Secure access from any platform, including unparalleled support for certificate-based access on Windows, Linux, and Mac OS platforms
3. Rapid and easy deployment with Aladdin's Token Management System (TMS): a single system managing the entire solution.

The e Token VPN authentication solution provide us the mind free that users gaining access to the network are authorized to do so.
eToken operates seamlessly with all leading VPN products

Source: http://www.aladdin.com/etoken/solutions/secure-vpn-access.aspx

Monday, June 22, 2009

VPN performance is an increasingly important issue

Nowaday's Vertul private network security and diffrence, with performance a lower prevalence and rightly so. Vertul private network is mostly set up with security as one of the primary target, and in many cases, VPNs to be able to interoperate between different vendors, so diffrence is also a key factor. although, performance is becoming more important as VPNs become more prevalent corporate networks.

If our VPN seems slow, or we just want to know how skilful it really is, we have a number of options for improving its performance. Let's look at some of the steps involve.

Mostly generaly, there are two types of VPNs remote client VPNs and site-to-site VPNs. A remote client is Mostly a single PC that uses VPN software to connect to the his domain network on demand, while a site-to-site VPN is Mostly use permanent connection between two sites using dedicated networking equipment. A remote client VPN typically supports telecommuters, while the site-to-site various usually connects office networks.

The Vertul private network built-in Remote Access Services. On the client side, we are running a Windows XP Professional workstation over a 1-Mbps DSL connection. This connection uses Point-to-Point Tunnelling Protocol (PPTP) to connect to the central server.

The Vertul private network While more mostly support than Layer 2 Tunnelling Protocol, PPTP is giving way to L2TP as the tunneling protocol of choice because of L2TP's allready increased security features. although, establishing an L2TP VPN is more complex than setting up a PPTP connection. PPTP-based VPNs may also operate some faster because there is less processing involved in encrypting and encapsulating the packets. Under PPTP, the point-to-point protocol (PPP) payload packet is encapsulated inside a generic routing encapsulation packet, which is then encapsulated inside an IP packet to which the data link header is attached. The packet is then sent across the tunnel.

The topology of our VPN can also have a important efect on its performance and can very widely between the remote devices. If we aresupporting a site-to-site VPN that connects two different remote offices, it's likely that both ends use straight-out equipment configured for a permanent VPN tunnel. If our VPN performance seems slow, we may need to increase the size of the tunnel by adding bandwidth at both ends. we might also be able to change configuration options to increase performance.

Source: http://news.zdnet.co.uk/hardware/0,1000000091,2132230,00.htm

Friday, June 19, 2009

Which VPN should use for cloud connections

Now we are using the update technology have given businesses and client users a mostly of connection choices. A typical user might work from a laptop running Windows Vista while in the office or at home it doesn't matter. The office network might be accessed through a wall jack, with heavily monitored traffic.

we are use At home the user may be connect over a local wireless LAN with fast Internet from a Dsl connection. On the road the user probably connects via a combination of a smart phone, such as a Black Berry running the latest version of the Black Berry OS, and a super-lightweight net book running Linux; the network could be a Wi-Fi hotspot or a wireless broadband connection.

The Virtual private networks provide chance to make a secure network connection across a public network through the use of encryption because it is very important when user connect his network that time secure his connection and network Although, VPNs provide privacy and a level of trust. Before discussing the various trust issues associated with VPNs, it's necessary to note that the term itself has multiple implementations. VPN types include network-to-network, multiple service host-server, to single-service host-server. Each of these implementations can be used in a cloud computing environment, and each has security strengths and weaknesses.

The old Virtual private networks technology we can connect only the network-to-network VPN. This architecture has the greatest risk associated with it, due in part to the number of hosts involved. While this architecture would not likely be used in the client-to-cloud connection, it could be used within the cloud, especially with server farms or mashups.

The Virtual private networks the network-to-network VPN presents some good security challenges. The possibility was to hack via the encrypted tunnel without fear of detection is a strong incentive for any would-be hacker. This model gives an attacker the ability to use many services on many hosts in order to gain access and control of cloud computing data. The network-to-network VPN provides network transparency and management that enables inspection of the traffic after the point of decryption, but it does not protect the data payload end-to-end.


Source: http://searchsecurity.techtarget.com.au/articles/33071-Which-VPN-should-you-use-for-cloud-connections-

Thursday, June 18, 2009

GRE Protocol 47 Packet Description and Use

The vpn Generic Route Encapsulation protocol is used in conjunction with Point-to-Point Tunneling Protocol, because it select best route.to create virtual private networks, when we create a connection between clients and servers. this is very important service when making a connection. One another implementation is to use Microsoft's VPN technology between two Routing and Remote Access Services servers that are configured for LAN-to-LAN routing.

we can understand the use of Generic Route Encapsulation in the creation and use of VPNs, it is helpful to understand the packet structure. After the PPTP control session has been established, GRE is used to encapsulate the data or payload in a secure manner. For additional information about PPTP The GRE packet format that Microsoft uses for encapsulating data has the fallow general process.

The vpn Generic Route Encapsulation protocol that is work through the tunnel is given a PPP header and then placed inside a Generic Route Encapsulation packet. Generic Route Encapsulation packet send the data between the two tunnel to destination points. After the GRE packet has arrived at the final destination from source to destination. it is discarded and the encapsulated packet is then transmitted to its final destination.


We are Using the diagram at the top of this section, an Internet Protocol (IP) packet from Lclient is first transmitted to the L-RRAS server.The IP packet is encrypted, given an additional PPP header, and then placed inside a GRE packet. The diagram below says "PPP stub" and not "PPP header" because the PPP header is also encrypted along with the data.

The Generic Route Encapsulation protocol is configured to know that a PPP header is already here. The GRE packet with the encapsulated and encrypted data is sent. these time when user data send or recive, across the Internet with a final destination of "R-RRAS server." The R-RRAS server strips off the GRE header and PPP header, and then transmits the decrypted data (IP packet) to Rclient.


Source: http://support.microsoft.com/kb/241251/

Wednesday, June 17, 2009

How to increase Security on Windows VPN Server

The microsoft Windows 2000 vpn server that is we can configure by the Routing and Remote Access Services feature is install with a default set of Input and Output filters. These services support Point-to-Point Tunneling Protocol , Layer 2 Tunneling Protocol , and IP Security Protocol connectivity. The filters are generic and can be modified to tighten security on a VPN server. This topic we describes modifications that we can make to these filters to increase security. All filter configurations mentioned in this topic should be tested prior to being deployed in a production environment.

The RRAS feature install creates a set of default Input and Output Filters on the external adapter on the VPN server. these are make high security. To display and edit these filters:

1. Start the Routing and Remote Access snap-in in Microsoft Management Console (MMC).
2. Expand the IP Routing node in the left pane.
3. Click General in the left pane.
4. Right-click the external adapter listed in the right pane, and then click Properties.
5. You can view and edit the Inbound and Outbound filters on the General tab.
These are the default filters that are configured.

More security can be provide these services. by editing each of these services and further restricting the flow of PPTP and/or L2TP/IPSec packets. we must edit the Input and Output filters. The result is that inbond PPTP, L2TP/IPSec traffic will be restricted to the IP address of the external adapter and only PPTP, L2TP/IPSec traffic will be allowed to pass out through the external adapter from the internal network or the VPN server it self.

Input and Output filters services are edit personaly by selecting the filter and then clicking Edit button. The Edit IP Filter dialog box allows we can modify each filter setting. example: like that the external adapter has an IP address of 192.0.0.40 with a subnet mask of 255.255.255.0. After modifying the Input filters.

The default filter service settings that installe by using the RRAS Setup. which was allow for VPN connections only. The information in this topic is provide for those who want increased security.

Source: http://support.microsoft.com/kb/255784/

Friday, June 12, 2009

virtual private networks tunneling

The Virtual private network it work on the base of tunneling protocol . Virtual private network tunneling establishing and maintaining his network connection, when user go out of office then he connect his localy network . On the connection, packets constructed in a specific VPN protocol format are encapsulated within some protocols, then transmitted between Virtual private network client and server.

The Virtual private networks, VPN protocols also support authentication and encryption to keep the tunnels secure. when connect his clients on his domain that time his network secure, VPN supports two types of tunneling - voluntary and compulsory. Both types of tunneling are commonly used. In voluntary tunneling, the VPN client manages connection setup. The client first makes a connection to the carrier network provider. Then, the VPN client application creates the tunnel to a VPN server over this live connection.

The some computer network protocols have been implemented We are use with VPN tunnels protocols. There are some most popular VPN tunneling protocols PPTP, L2TP, IPsec. These protocols are generally incompatible with each other. Several corporations worked together to create the PPTP specification. People generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in client support for this protocol. The initial releases of PPTP for Windows by Microsoft contained security features that some experts claimed were too weak for serious use. Microsoft continues to improve its PPTP support, though.

The The Virtual private networks original competitor to PPTP for VPN tunneling was L2F, a protocol implemented. with the cisco because cisco is very efective technology. In an attempt to improve on L2F, the best features of it and PPTP were combined to create new standard called L2TP. Like PPTP, L2TP exists at the data link layer. because it is transfers data between adjacent network nodes in a wide area network or between nodes on the same local area network segment.

Thus the origin of its name. IPsec is actually a collection of multiple related protocols. It can be used as a complete VPN protocol solution, or it can used simply as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer. because The Network Layer is responsible for end-to-end (source to destination) packet delivery including routing through intermediate hosts, whereas the Data Link Layer is responsible for node-to-node (hop-to-hop) frame delivery on the same link.

Source: http://compnetworking.about.com/od/vpn/a/vpn_tunneling.htm

Thursday, June 11, 2009

How to create a new VPN connection

We are discribing step-by-step article describes how to configure a virtual private network connection to our corporate network in Microsoft Windows XP Professional. A virtual private network connection is a connection that uses both private and public networks to create a network connection. This is easiy way, if you people want see these steps.

Both Are Point-to-Point Tunneling protocol or Layer Two Tunneling Protocol, These are services automatically installed on your Windows XP-based computer. Because this services inbuild with windows xp. These services help provide security when you access resources on a network by connecting to a remote access server through the Internet. This types of connection is we called as a virtual private network connection.

1. Click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections.2. Click Create a new connection, and then click Next. 3. Click Connect to the network at my workplace, and then click Next.4. Click Virtual Private Network connection, and then click Next. 5. Type a descriptive name for your company, and then click Next.6. Click Do not dial the initial connection, and then click Next.7. Type the host name or IP address of the computer where you are connecting, and then click Next.8. Use one of the following methods: Click Anyone's use if you want to share the connection with all users. Click My use only if you do not want to share the connection. 9. Click Next, and then click Finish.

Note: This method works when you are connected to the Internet only.

How to modify an existing dial-up connection:

You may have to modify some of the parameters in your dial-up connection to successfully connect to the Internet. To make these modifications, follow these are some steps:
To open an existing connection, click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections.Click the connection, and then click Change settings of this connection.On the General tab, you can change the server name or IP address.On the Networking tab, you can change the type of secure protocol.On the Advanced tab, you can enable Internet Connection Firewall protection to prevent access to your computer from the Internet.

To do this, select the Protect my computer and network by limiting and preventing access to this computer from the Internet check box.

Note: When you enable Internet Connection Firewall protection to prevent access to your computer from the Internet, you may also create problems with the connection to your server. After you enable Internet Connection Firewall protection, verify that the connection to your server is still working.

A firewall is designed to help protect your computer from attack by malicious users or by malicious software such as viruses that use unsolicited incoming network traffic to attack your computer. If the connection to your server is working and you decide to disable your firewall, you must disconnect your computer from all networks including the Internet.

Source: http://support.microsoft.com/kb/305550/EN-US/

Wednesday, June 10, 2009

Configuring ISA Virtual Private Networks

The Virtual Private Networks provide secure and advanced connections through a non-secure network by providing data privacy. Because when we configure vpn that time some extra services and protocals activate that services make my connection secure. Private data is secure in a public environment. Remote access Virtual private networks provides a common environment where many different sources such as intermediaries, clients and off-site employees can access information via web browsers or email. Many companies supply their own Virtual Private Networks connections via the Internet. Because some employ go out of country and that time he need connect his local network.

The typical components needed to create VPN connections are listed Here: VPN services need to be enabled on the server. VPN client software has to be installed on the VPN client. A VPN client utilizes the Internet, tunneling and TCP/IP protocols to establish a connection to the network The server and client have to be on the same network. A Public Key Infrastructure (PKI) The server and client have to use the same: Tunneling protocols Authentication methods Encryption methods.

we can configure ISA Server as a Virtual Private Networks endpoint. Here, ISA Server has to be installed in Integrated mode.Now we have to define a network connection on the ISA Server computer that provides connectivity to the Internet Service Provider I have define already step by step. The ISA Server computer must have a network adapter connected to the internal network as well. because with out network adaptor we can't do anything.

When we configure ISA Server as a Virtual Private Network endpoint that allows client connections, we have to perform a number of steps:Use the ISA Server VPN Configuration Wizards to create, configure, and secure the VPN connection. Verify the configuration settings created by the ISA Server VPN Configuration Wizard. Configure any additional settings and reconfigure existing settings. Test the VPN connection.

we can configure ISA Server as a Virtual Private Networks endpoint. Now, ISA Server has to be installed in Integrated mode. we have to define a network connection on the ISA Server computer that provides connectivity to the Internet Service Provider . The ISA Server computer must have a network adapter connected to the internal network as well. because with out network adaptor we can't do anything.

Source: http://www.tech-faq.com/configuring-isa-virtual-private-networks.shtml

Tuesday, June 9, 2009

Data encryption between VPN server and client

Data encryption
we should use data encryption to provide data confidentiality for the data that is sent the data between the VPN client and the VPN server across a shared or public network, where there is most of chance to risk of unauthorized people hack our network may be we face lot of problem.

we can configure the VPN server to force encrypted communications and then another person can't enter in our network. All Users who connect to his server must encrypt their data or a connection is not allowed enter any pertion his network without admin permition. For VPN connections, the Windows Server 2003 family uses Microsoft Point-to-Point Encryption with the Point-to-Point Tunneling Protocol and Internet Protocol security encryption with the Layer Two Tunneling Protocol.

Because data encryption is performed between the VPN client and VPN server, data encryption is not necessary on the communication link between a dial-up client and its Internet service provider but encription necessary only clients and server. For example, a mobile user uses a dial-up connection to dial in to a local ISP. Once the Internet connection is made, the user creates a VPN connection with the corporate VPN server. If the VPN connection is encrypted, encryption is not needed on the dial-up connection between the user and the ISP.


Data encryption for Point-to-Point Protocol or PPTP connections is available only if we use MS-CHAP, MS-CHAP v2, or EAP-TLS as the user-level authentication method.this is depend opon administrator which type of cncryption use his vpn connection. Data encryption for L2TP connections relies on IPSec computer-level authentication, which does because it is very high level provide security. not require any specific user-level authentication method.

VPN data encryption never provide end-to-end data encryption. clients and server data encryption between the client application and the server hosting the resource or service that is accessed by the client application. To get end-to-end data encryption, we can use IPSec to create a secure connection after the VPN connection compleeted.


Source: http://technet.microsoft.com/en-us/library/cc778013.aspx

Friday, June 5, 2009

Vpn services

vpn services is very important and also admin responsibility secure his network. computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger networks as opposed to running across a single private network. The Link Layer protocols of the virtual network are said to be tunneled through the transport network. but a VPN does not need to have explicit security features such as authentication or content encryption. when we use vpn services that time some service work wich was secure our data because when we send or recive data that time in encripted form hacker can't read easily our data.

Routing:
Tunneling protocols can be used in a point-to-point topology that would generally not be considered a VPN, because a VPN is expected to support arbitrary and changing sets of network nodes. Since most router implementations support software-defined tunnel interface, customer-provisioned VPNs often comprise simply a set of tunnels over which conventional routing protocols run. PPVPNs, however, need to support the coexistence of multiple VPNs, hidden from one another, but operated by the same service provider.

Building blocks:
Depending on whether the PPVPN runs in layer 2 or layer 3, the building blocks described below may be L2 only, L3 only, or combinations of the two. Multiprotocol Label Switching (MPLS) functionality blurs the L2-L3 identity..

Layer 1 services:
Virtual private wire and private line services In both of these services, the provider does not offer a full routed or bridged network, but components from which the customer can build customer-administered networks. VPWS are point-to-point while VPLS can be point-to-multipoint. They can be Layer 1 emulated circuits with no data link structure. An unfortunate acronym confusion can occur between Virtual Private Line Service and Virtual Private LAN Service; the context should make it clear whether "VPLS" means the layer 1 virtual private line or the layer 2 virtual private LAN.

Layer 2 services:
Layer 2 that allows for the coexistence of multiple LAN broadcast domains, interconnected via trunks using the IEEE 802.1Q trunking protocol.because it is secure compare to another. Other trunking protocols have been used but have become obsolete, including Inter-Switch Link .

Virtual private LAN service
VLANs allow multiple tagged LANs to share common trunking. The former is a layer 1 technology that supports emulation of both point-to-point and point-to-multi point topologies. The method discussed here extends Layer 2 technologies such as 802.1d and 802.1q LAN trunking to run over transports.

A VPLS is a Layer 2 PPVPN, rather than a private line, emulating the full functionality of a traditional local area network. From a user standpoint, a VPLS makes it possible to interconnect several LAN segments over a packet-switched, or optical, provider core. making the remote LAN segments behave as one single LAN. user could be access.


Source: http://en.wikipedia.org/wiki/Virtual_private_network#Virtual_private_LAN_service_.28VPLS.29

Thursday, June 4, 2009

Setting up the Vista vpn server

How-To create as an example of one way to remotely access a home office network using a Point-to-Point Tunneling Protocol (PPTP) Virtual Private Network (VPN) connection over the public internet using technologies built-in to the Vista operating system. Configurations are based on remote user access to this example local area network. Note the setup and configuration procedure should be run while logged on as a user with Administrator privileges. This procedure applies to the following versions of Vista: Home Basic, Home Premium, Business, Enterprise, Ultimate.

Logon the Vista PC as a user with Administrator privileges. The Vista VPN Server is configured by navigating to Start | Control Panel | Network and Internet | Network and Sharing Center and selecting Manage network connections. Select File | New Incoming Connection from the drop down menu. If the Menu bar is not visible press the key on the keyboard to toggle it on.

Select user's that will be allowed to login to the PPTP VPN server through the VPN connection. Click Next. In the example shown a special standard user account protected by a strong password that is only used for remote VPN access is selected. Click on Add someone... to add the special user account. Select the Through the Internet check box then click on Next. Select Internet Protocol Version 4 (TCP/IPv4) and then click on Properties.

If remote VPN users will be allowed to access the home local area network check the Allow callers to access my local area network checkbox. Configure the IP address assignment window using IP addresses in the same subnet as the VPN server PC and LAN (see the example local area network). In the following example the From: address is the address assigned to the VPN gateway and the To: address is assigned to the incoming VPN client. Click OK when finished Click on Close.. Note that by design Vista will only accept one incoming VPN connection at a time. When finished the Network Connections window will indicate the new Incoming Connections icon.

Configure the Network Firewall/NAT Router for PPTP VPN access:
If the Vista PPTP VPN server PC is behind a broadband router, the router must be configured to allow PPTP VPN access. Both TCP Port 1723 and GRE Protocol 47 are used to pass PPTP VPN traffic through the firewall. Some router manufacturers call enabling GRE Protocol 47 traffic PPTP Pass Through or VPN Pass Through.

The Vista Windows Firewall will be automatically configured to allow PPTP VPN access. GRE Protocol 47 traffic is automatically enabled through the Windows Firewall when TCP Port 1723 is opened. For more information about the Windows Firewall.


Server configuration
The Vista PPTP VPN server computer administrator can configure these properties by navigating to Start | Control Panel | Network and Internet | Network and Sharing Center and selecting Manage network connections. Right-click the Incoming Connections icon then click Properties. Check the Require all users to secure their passwords and data check box.


Source: http://theillustratednetwork.mvps.org/Vista/PPTP/PPTPVPN.html

Wednesday, June 3, 2009

access vpn service after adisable vpn security

A company spokesperson told InternetNews.com that the company could not comment due to an ongoing FBI investigation, but added, "at no time were any of our operations at risk, and the employee under investigation did not have access to customer data so it has not been compromised. The news comes shortly after a report from identity management specialist SailPoint said that most IT departments are unprepared for layoffs because they cannot get a complete view of a terminated employee's access privileges from any one tool.



The IT environment is complex at large companies because business managers rather than IT managers choose what applications are deployed, according to Guy Mounier, CTO of enterprise search enhancer BA Insight. A centralized IT department can impose rational portfolio consolidation, but the reality is that most divisions have strong profit and loss (P&L) responsibilities, and if they value a piece of technology, they will use it regardless of the rest of the company's strategies and goals.


The complexity is growing, according to Brian Cleary, vice president of marketing at identity management company Aveksa, and makes handling layoffs harder. "During a workforce reduction, the first thing the IT department does is pull network access control, but they forget to turn off any back door. Think of all the applications that present themselves via a Web interface. Organizations are missing those and leaving themselves exposed," Cleary told InternetNews.com.


The problem of orphan accounts, which are credentials that are still valid even after their user has gone, is usually discovered during audits, such as those for Sarbanes-Oxley compliance, Cleary added. He said that most IT managers focus on the threat within the IT department, paying less attention to the challenge of managing key experts. "Losing corporate intellectual property (IP) is a big deal," said Cleary.

Tuesday, June 2, 2009

How to Configure the VPN Server and clients

A virtual private network is a means of connecting to a private network by way of a public network, such as the Internet. This combines the virtues of a dial-up connection to a dial-up server with the ease and flexibility of an Internet connection. By using an Internet connection, you can travel worldwide and still, in most places, connect to your office with a local call to the nearest Internet access phone number. If you have a high-speed Internet connection at your computer , we can communicate with our office at full Internet speed, which is much faster than any dial-up connection using an analog modem.


To install and enable a VPN server, follow these steps:
On the Microsoft Windows 2000 VPN computer, confirm that both the connection to the Internet and the connection to your local area network (LAN) are correctly configured.
Click Start, point to Administrative Tools, and then click Routing and Remote Access.
Click the server name in the tree, and click Configure and Enable Routing and Remote Access on the Action menu, and then click Next.

In the Common Configurations dialog box, click Virtual private network and then click Next.
In the Remote Client Protocols dialog box, confirm that TCP/IP is included in the list, click Yes, all of the available protocols are on this list, and then click Next.
In the Internet Connection dialog box, select the Internet connection that will connect to the Internet, and then click Next.

In the IP Address Assignment dialog box, select Automatically in order to use the DHCP server on your subnet to assign IP addresses to dialup clients and to the server.
In the Managing Multiple Remote Access Servers dialog box, confirm that the No, I don't want to set up this server to use RADIUS now checkbox is selected.
Click Next, and then click Finish.

Right click the Ports node, and then click Properties.
In the Ports Properties dialog box, click the WAN Miniport (PPTP) device, and then click Configure.
In the Configure Device - WAN Miniport (PPTP) dialog box, do one of the following:
If you do not want to support direct user dialup VPN to modems installed on the server, click to clear the Demand-Dial Routing Connections (Inbound and Outbound) check box.
If you do want to support direct user dialup VPN to modems installed on the server, click to select the Demand-Dial Routing Connections (Inbound and Outbound) check box.
Type the maximum number of simultaneous PPTP connections that you want to allow in the Maximum Ports text box. (This may depend on the number of available IP addresses.
Repeat steps 11 through 13 for the L2TP device, and then click OK.

To further configure the VPN server as required, follow these steps.
Configuring the Remote Access Server as a Router
For the remote access server to forward traffic properly inside your network, you must configure it as a router with either static routes or routing protocols, so that all of the locations in the intranet are reachable from the remote access server.

Click Start, point to Administrative Tools, and then click Routing and Remote Access.
Right-click the server name, and then click Properties.
On the General tab, click to select Enable This Computer As A Router.
Select either Local area network (LAN) routing only or LAN and demand-dial routing, and then click OK to close the Properties dialog box.

How to Configure PPTP Ports:
............................

Confirm the number of PPTP ports that you need. To verify the number of ports or to add ports, follow these steps:
Click Start, point to Administrative Tools, and then click Routing and Remote Access.
In the console tree, expand Routing and Remote Access, expand the server name, and then click Ports.
Right-click Ports, and then click Properties.
In the Ports Properties dialog box, click WAN Miniport (PPTP), and then click Configure.
In the Configure Device dialog box, select the maximum number of ports for the device, and then select the options to specify whether the device accepts incoming connections only, or both incoming and outgoing connections.
How to Manage Addresses and Name Servers
The VPN server must have IP addresses available in order to assign them to the VPN server's virtual interface and to VPN clients during the IP Control Protocol (IPCP) negotiation phase of the connection process. The IP address assigned to the VPN client is assigned to the virtual interface of the VPN client.

For Windows 2000-based VPN servers, the IP addresses assigned to VPN clients are obtained through DHCP by default. You can also configure a static IP address pool. The VPN server must also be configured with name resolution servers, typically DNS and WINS server addresses, to assign to the VPN client during IPCP negotiation.


How to Manage Access:
........................................

Configure the dial-in properties on user accounts and remote access policies to manage access for dial-up networking and VPN connections.

NOTE: By default, users are denied access to dial-up.


Access by User Account:
.........................................

If you are managing remote access on a user basis, click Allow Access on the Dial-In tab of the user's Properties dialog box for those user accounts that are allowed to create VPN connections. If the VPN server is allowing only VPN connections, delete the default remote access policy called "Allow Access If Dial-In Permission Is Enabled." Then create a new remote access policy with a descriptive name, such as VPN Access If Allowed By User Account. For more information, see Windows 2000 Help.

CAUTION: After you delete the default policy, a dial-up client that does not match at least one of the policy configurations you create will be denied access.

If the VPN server is also allowing dial-up remote access services, do not delete the default policy, but move it so that it is the last policy to be evaluated.


Access by Group Membership:
....................................................

If we are managing remote access on a group basis, click the Control access through remote access policy radio button on all user accounts by using the Active Directory Users and Computers Console in Administrator Tools or MMC snap-in. Create a Windows 2000 group with members who are allowed to create VPN connections. If the VPN server allows only VPN connections, delete the default remote access policy called Allow Access If Dial-In Permission Is Enabled. Next, create a new remote access policy with a descriptive name such as VPN Access If Member Of VPN-Allowed Group, and then assign the Windows 2000 group to the policy.

If the VPN server also allows dial-up networking remote access services, do not delete the default policy; instead move it so that it is the last policy to be evaluated.


How to Configure a VPN Connection from a Client Computer
To set up a connection to a VPN:
On the client computer, confirm that the connection to the Internet is correctly configured.
Click Start, point to Settings, and then click Network And Dial-Up Connections.
Double-click Make New Connection.
Click Next, and then click Connect To A Private Network Through The Internet, and then click Next.
Do one of the following:
If you use a dial-up connection to connect to the Internet, click Automatically Dial This Initial Connection and then select your dial-up Internet connection from the list.
If you use a full-time connection (such as a cable modem), click Do Not Dial The Initial Connection.
Click Next.
Type the host name (for example, Microsoft.com) or the IP address (for example, 123.123.123.123) of the computer to which you want to connect, and then click Next.
Click to select For All Users if you want the connection to be available to anyone who logs on to the computer, or click to select Only For Myself to make it available only when you log onto the computer, and then click Next.
Type a descriptive name for the connection, and then click Finish.

NOTE: This option is available only if you are logged on as a member of the Administrators group.
Click Start, point to Settings, and then click Network And Dial-Up Connections.
Double-click the new connection.
Click Properties to further configure options for the connection:

If you are connecting to a domain, click the Options tab, and then click to select the Include Windows logon domain check box to specify whether to request Windows 2000 logon domain information before attempting to connect.
If you want the connection to be redialed if the line is dropped, click the Options tab, and then click to select the Redial if line is dropped check box.
To use the connection:
Click Start, point to Settings, and then click Network And Dial-Up Connections.
Double-click the new connection.

If you do not currently have a connection to the Internet, Windows offers to connect to the Internet.
Once the connection to the Internet is made, the VPN server prompts you for your user name and password. Enter your user name and password, click Connect, and your network resources should be available to you in the same way they are when you connect directly to the network.NOTE: To disconnect from the VPN, right-click the connection's icon, and then click Disconnect.

Monday, June 1, 2009

New information about vpn

VPN Technologies is a privately held company based in the Pleasanton, California, integrating a suite of leading-edge networking and software technologies. VPN Technologies has designed and deployed a virtual network software that provides secure, reliable, and scalable communication services, not only fulfilling the requirements of the traditional virtual private network (VPN) market, but also addressing the demands of real-time media exchange and distribution applications. Open VPN, our award-winning open source VPN product, has established itself as a de-facto standard in the open source networking space, with over 2.5 million downloads since inception. OpenVPN Technologies is the provider of next-generation secure and scalable communication services, implementing its business plan through strategic partnerships with key application software providers and marketing its product to SMB market place through its OpenVPN web site that is experiencing more than 200,000 new SMB users, prospects, and customers per month.
The company was co-founded by Francis Dinha and James Yonan. Francis Dinha is an accomplished executive with domestic and international experience in operations, P&L management, strategic product positioning, technology development, and business planning with both startup and growth organizations. James Yonan is the author of the OpenVPN software package, and has since established OpenVPN as an award-winning offering in the Open Source security space.
A VPN connection allows a computer to establish a virtual and private connection to a network over the Internet. The connection is virtual because when the computer establishes a VPN connection over the Internet, the computer making the VPN connection acts like a node that’s directly connected to the network, as if it had an Ethernet cable connected to that network. The user can access all the same resources he could connect to as if he were directly connected to the network. However, in the case of the VPN client connection to a VPN server, the connection is a virtual one because there is no actual Ethernet connection to the destination network. The connection is private because the contents of the datastream moving inside the VPN connection are encrypted so that no one over the Internet is able to intercept and read the contents of the communications moving over the VPN link. Windows Servers and clients have supported VPN connections since the days of Windows NT and Windows 95. While Windows clients and servers have supported VPN connections for over a decade, the type of VPN support has evolved over time. Windows Vista Service Pack 1 and Windows Server 2008 now support three types of VPN connections.

Thursday, May 28, 2009

Server support

A VPN is a virtual private network that is used to connect the remote sites or remote users together using a public network (like, internet). VPN uses virtual connections to route traffic from the private network to the remote site. Following are the key benefits of using a VPN connection:

Users working at home can use the VPN connections to connect to their company's private network. Organizations can use VPN connection to establish connections with geographically separate offices using the public network like internet. Communication over VPN connection is more secure because VPN uses the following two protocols for data encryption:

Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) with Internet Protocol security (IPSec)