What is a VPN channel. Why do you need a VPN, what is it, how to set it up, and why VPN is good. VPN clients and their configuration

Soon there will be articles on the site talking about anonymity on the Internet with using VPN. We will set up a VPN on different devices Oh. In order not to write every time in every article what virtual private network VPN is why I decided to write this article.

If you are interested in issues of anonymity on the Internet, I advise you to read the article “” where we talked about proxy connections, why proxies are needed and what types there are.

In this article I will not dig deep. I will only tell you about the most important things that a person who is thinking about anonymity on the Internet needs to know.

Virtual private network Virtual Private Network (VPN) are technologies that provide the ability to provide one or several network connections over another network, for example, the Internet.

This connection has the form of an encrypted tunnel that connects directly the user’s computer and remote server, which allows not only but also to encrypt your traffic. In other words, this way you will be able to download anything from anywhere, and no one will know about it.

Types of VPN connections

You can set up the following types of VPN connections: As I said earlier, all information is reduced to the required minimum. Read more in specialized literature.

Virtual private network PPTP

RRTR- Point-toPoint Tunneling Protocol is a point-to-point tunnel protocol that will help establish a secure tunnel in an unsecured network. It is the most popular VPN connection method, but many Internet providers block such applications.

OpenVPN Virtual Private Network

OpenVPN- is a free implementation of this technology with the provision open source to create your own encrypted channels using the “point-to-point” or “server-client” types. The latter allows you to use another computer as a VPN server. However, setting up a tunnel requires installing a special software coupled with the knowledge to work with it.

L2TP Virtual Private Network

L2TP(Layer 2 Tunneling Protocol) is the most labor-intensive type of VPN tunnel to set up, but allows you to create it with specified access priorities, making it the most secure.

And although VPNs are not literally anonymizers, today most sites providing CGI-proximity services offer to purchase their own VPN channel. This technology is gaining momentum, so it is likely that soon the number of familiar anonymizers will be reduced to the required minimum.

Imagine a scene from an action-packed movie in which the villain escapes the crime scene along the highway in a sports car. He is being pursued by a police helicopter. The car enters a tunnel that has several exits. The helicopter pilot does not know which exit the car will appear from, and the villain escapes the chase.

VPN is a tunnel connecting many roads. No one from the outside knows where the cars entering it will end up. No one from the outside knows what is happening in the tunnel.

You've probably heard about VPN more than once. Lifehacker also talks about this thing. Most often, a VPN is recommended because using the network you can access geo-blocked content and generally increase security when using the Internet. The truth is that accessing the Internet through a VPN can be no less dangerous than directly.

How does a VPN work?

Most likely, you have a Wi-Fi router at home. Devices connected to it can exchange data even without the Internet. It turns out that you have your own private network, but in order to connect to it, you need to be physically within reach of the router’s signal.

VPN (Virtual Private Network) is a virtual private network. It runs on top of the Internet, so you can connect to it from anywhere.

For example, the company you work for may use a virtual private network to remote employees. Using a VPN, they connect to work network. At the same time, their computers, smartphones or tablets are virtually transferred to the office and connected to the network from the inside. To log into a virtual private network, you need to know the VPN server address, login and password.

Using a VPN is quite simple. Usually a company installs a VPN server somewhere on local computer, server or data center, and connection to it occurs using a VPN client on the user device.

Nowadays, built-in VPN clients are available in all current operating systems, including Android, iOS, Windows, macOS and Linux.

The VPN connection between the client and the server is usually encrypted.

So VPN is good?

Yes, if you are a business owner and want to secure corporate data and services. Letting employees into work environment only via VPN and accounts, you will always know who did and is doing what.

Moreover, the VPN owner can monitor and control all traffic that goes between the server and the user.

Do your employees spend a lot of time on VKontakte? You can block access to this service. Does Gennady Andreevich spend half his working day on sites with memes? All his activity is automatically recorded in logs and will become an ironclad argument for dismissal.

Why VPN then?

VPN allows you to bypass geographic and legal restrictions.

For example, you are in Russia and want. We regret to learn that this service is not available from the Russian Federation. You can use it only by accessing the Internet through a VPN server in the country in which Spotify operates.

In some countries, there is Internet censorship that restricts access to certain sites. You want to access some resource, but it is blocked in Russia. You can open the site only by accessing the Internet through a VPN server of a country in which it is not blocked, that is, from almost any country except the Russian Federation.

VPN is useful and required technology, which copes well with a certain range of tasks. But the security of personal data still depends on the integrity of the VPN service provider, your common sense, attentiveness and Internet literacy.

VPN (VPN) - virtual private networks, are on everyone's lips today. Many inexperienced users imagine them as a magic key to access blocked web resources: press a button and the site opens. Beauty! Yes, unblocking sites is one of the VPN functions, the most popular, but far from the most important. The main purpose of virtual private networks is to protect data transmitted over the Internet from interception by people for whom the data is not intended.

Let's talk about what virtual private networks are, what functions they perform, where they are used and what their disadvantages are. We’ll also get acquainted with the capabilities of several popular VPN applications and browser extensions that can be used on both PCs and mobile devices.

To better understand the essence of VPN technology, let’s imagine the Internet as a network of roads along which postal vans carrying letters and parcels travel. They do not hide at all where they are going and what they are carrying. Letters and parcels sometimes get lost along the way and often fall into the wrong hands. Their sender and recipient cannot be 100% sure that the contents of the package will not be read, stolen or replaced by someone, since they do not control the delivery process. But they know that in terms of security, this method of transfer is not very reliable.

And then a closed tunnel appeared among the roads. The vans that pass through it are hidden from prying eyes. No one knows where the car goes after entering the tunnel, what it delivers or to whom. Only the sender and recipient of the correspondence know about this.

As you may have guessed, our imaginary tunnel is a virtual private network built on the basis of more large network- World Wide Web. The traffic passing through this tunnel is hidden from outsiders, including the provider. The provider, if anyone doesn’t know, under normal conditions (without a VPN) can track and control your actions on the Internet, since it sees what resources you visit. But if you “dive” into a VPN, it won’t be able to. In addition, information sent through such a channel becomes useless for lovers of other people's property - hackers, since it is encrypted. This is the essence of the technology and the simplified principle of VPN operation.

Where are VPNs used?

I hope it’s clear what this VPN is needed for. Now let's see where, how and what it is used for. So, you can’t do without a VPN:

  • In corporate networks. Here it is necessary for the exchange of confidential data between employees or network resources companies and clients. An example of the second case is managing accounts through applications such as bank client and mobile bank. VPNs are also used to solve technical problems - traffic separation, Reserve copy and so on.
  • In public Wi-Fi networks, for example, in a cafe. Such networks are open to everyone and traffic passing through them is very easy to intercept. Owners open points VPN services do not provide access. The user himself must take care of the protection of information.
  • To hide the web resources you visit, for example, from your boss or system administrator at work.
  • For exchange classified information with other people if you don’t trust your regular Internet connection.
  • To access blocked sites.
  • To maintain anonymity on the Internet.

Providing access to world wide web VPN is widely used and Russian Internet providers when connecting subscribers.

Types of VPN

As you may know, the functioning of any computer network is subject to rules that are reflected in network protocols. Network protocol is a kind of set of standards and instructions that describe the conditions and procedure for exchanging data between participants in a connection ( we're talking about not about people, but about devices, operating systems and applications). VPN networks are distinguished by the type of protocols on which they operate and the technologies used to construct them.

PPTP

PPTP (Point-to-Point Tunneling Protocol) is the oldest data transfer protocol in virtual private networks, it is already more than 20 years old. Due to the fact that it appeared a long time ago, it is known and supported by almost all existing operating systems. It places almost no load on the computing resources of the hardware and can be used even on very old computers. However, in current conditions its security level is very low, that is, data transmitted over the PPTP channel is at risk of hacking. By the way, some Internet providers block applications that use this protocol.

L2TP

L2TP (Layer 2 Tunneling Protocol) is also a fairly old protocol, created on the basis of PPTP and L2F technologies (the latter is specifically designed for tunneling PPTP messages). Provides a higher degree of traffic protection than just PPTP, as it allows you to set access priorities.

The L2TP protocol is still widely used today, but usually not in isolation, but in combination with other security technologies, such as IPSec.

IPSec

IPSec is a complex technology that uses many different protocols and standards. It is constantly being improved, therefore, when used correctly, it provides quite high level communication security. Can be combined with other network connection security systems without causing conflicts. These are his strengths.

The disadvantages of IPSec are that it is labor-intensive to set up and is intended to be used only by trained specialists (if configured incorrectly, it will not provide any acceptable security). In addition, IPSec is quite demanding on hardware resources computing systems and on weak devices it can cause slowdowns.

SSL and TLS

SSL and TLS are mainly used for safe transfer information on the Internet through web browsers. They protect confidential data of website visitors from interception - logins, passwords, correspondence, payment details entered when ordering goods and services, etc. Addresses of websites that support SSL begin with the HTTPS prefix.

A special case of using SSL/TLS technologies outside of web browsers is cross-platform OpenVPN software.

OpenVPN

OpenVPN is a free implementation of VPN technology designed to create secure communication channels between Internet users or local networks client-server or point-to-point type. In this case, one of the computers participating in the connection is designated as the server, the rest are connected as clients. Unlike the first three types of VPN, it requires the installation of special software.

OpenVPN allows you to create secure tunnels without changing the settings of your computer's main connection to the network. Designed for experienced users, since its setup cannot be called simple.

MPLS

MPLS is a technology for multi-protocol data transmission from one node to another using special labels. A label is part of the packet’s service information (if you imagine the data being sent as a train, then the packet is one car). Labels are used to redirect traffic within an MPLS channel from device to device, while the rest of the contents of the packet headers (the same as the address on the letter) are kept secret.

To enhance the security of traffic transmitted over MPLS channels, IPSec is also often used.

These are not all the types of virtual private networks that exist today. The Internet and everything that comes into contact with it is in constant development. Accordingly, new VPN technologies are emerging.

Virtual Private Network Vulnerabilities

Vulnerabilities are gaps in the security of the VPN channel through which data can leak outside - into public network. Unfortunately, there is no absolutely impenetrable protection. Even a very well-built channel will not give you a 100% guarantee of anonymity. And this is not about hackers who break encryption algorithms, but about much more banal things. For example:

  • If the connection to the VPN server is suddenly interrupted (and this happens often), but the connection to the Internet remains, some of the traffic will go to the public network. Technologies are used to prevent such leaks VPN Reconnect(automatic reconnection) and Killswitch (disconnecting the Internet when the connection to the VPN is lost). The first is implemented in Windows, starting with the “seven”, the second is provided third party software, in particular, some paid VPN applications.
  • When you try to open a website, your traffic is first sent to a DNS server, which determines the IP address of that website based on the address you entered. Otherwise, the browser will not be able to load it. Requests to DNS servers (unencrypted, by the way) often go beyond the VPN channel, which breaks the mask of anonymity from the user. To avoid this situation, specify in the Internet connection settings DNS addresses that your VPN service provides.

  • Web browsers themselves, or more precisely, their components, for example, WebRTC, can create data leaks. This module is used for voice and video communication directly from the browser, and it does not allow the user to select a method network connection yourself. Other Internet-facing applications may also use unsecured connections.
  • VPN works on networks that are based on the IPv4 protocol. In addition to it, there is the IPv6 protocol, which is still at the implementation stage, but is already being used in some places. Modern operating systems, in particular Windows, Android and iOS, also support IPv6, even more - on many of them it is enabled by default. This means that the user, without knowing it, can connect to public network IPv6 and its traffic will go outside the secure channel. To protect yourself from this, disable IPv6 support on your devices.

You can turn a blind eye to all these flaws if you use a VPN only to access blocked web resources. But if you need anonymity or security of your data while it's being transmitted over the network, it can cause you serious problems if you don't take additional security measures.

Using a VPN to bypass blocks and anonymize traffic

The Russian-speaking Internet audience most often uses VPNs precisely in order to freely visit blocked Internet resources and maintain anonymity on the Internet. Therefore, the bulk free VPN apps and the services are “tailored” just for this. Let's get to know some of them better.

Opera VPN

The developers of the Opera browser were the first to implement the VPN module directly into the product itself, saving users from the hassle of searching for and configuring third-party extensions. The option is enabled in the browser settings - in the “Security” section.

After switching on VPN icon appears in address bar Operas. Clicking on it opens a settings window, including an on/off slider and a choice of virtual location.

Volume of traffic passing through Opera VPN, has no restrictions, this is a plus. But the service also has a drawback - it only protects data that is transmitted via HTTP protocols and HTTPS. Everything else goes through the open channel.

In Opera, as well as the Yandex browser, there is another function with similar capabilities. This is a turbo traffic compression mode. It does not work together with a VPN, but it opens up access to blocked resources quite well.

Browsec browser extension and mobile app is one of the most famous VPN services. It supports all popular web browsers - Opera, Google Chrome, Firefox, Yandex, Safari, etc., provides fast and stable connection, does not require configuration, has no limit. Users of the free version are offered a choice of 4 servers: in the UK, Singapore, USA and the Netherlands.

A paid Browsec subscription costs about 300 rubles per month. Users of this tariff receive higher connection speeds, technical support and a large selection of servers around the world, including Russia, Ukraine, Latvia, Bulgaria, and Germany.

Hola

Hola is Browsec's main competitor and exists in the form of apps and browser extensions. Versions for Android, desktop systems and browsers work on the basis of peer-to-peer technologies (peer-to-peer network), where users themselves provide resources for each other. For personal, non-commercial use, access to them is provided free of charge. The choice of servers is quite large.

The iOS version of Hola is designed as a browser with an integrated VPN service. It is paid, costs about $5 per month. The trial period is 7 days.

Zenmate - third most popular VPN service, released as an extension for Opera, Google Chrome, Firefox, Maxthon Cloud Browser (Mac OS X only) and some other browsers. And also - in the form mobile applications for Android and iOS. At free use The speed limit is noticeable, and the choice of servers is very small. However, all traffic passing through the Zenmate VPN channel is securely encrypted.

Users who purchase premium access have a choice of more than 30 servers around the world. Plus, connection acceleration is enabled for them. Subscription prices start from 175 to 299 rubles per month.

Like other similar services, Zenmate does not need to be configured - just install and run. Working with it is intuitive, especially since the interface supports the Russian language.

Tunnelbear - another friendly one VPN user for different devices - PC for Windows control, Linux and OS X, smartphones for Android and iOS. Available in the form of applications (both mobile and desktop) and browser extensions. Has very useful function blocking traffic when the connection to the VPN is lost, which prevents data leakage in open network. By default, it selects the optimal communication channel taking into account the user's location.

The features of the free versions of Tunnelbear are no different from the paid ones, except for one thing - limiting the amount of traffic to 500 Mb per month. On a phone this may be enough if you don’t watch movies online, but on a computer it’s unlikely.

Neither paid nor free versions Tunnelbear does not collect any user data. You simply press a single button and gain access.

HideMy.name

HideMy.name - reliable and relatively inexpensive paid VPN service. Provides consistently high connection speeds even when watching online videos in HD quality and playing online games. Well protects traffic from interception and provides complete anonymity online. NideMy.name servers are located in 43 countries and 68 cities around the world.

HideMy.name supports any device that can connect to the Internet: not only phones and computers, but also routers, set-top boxes, SmartTV, etc. With one subscription, you can use the service on all devices simultaneously.

HideMy.name applications are available for Windows, Mac OS X, Linux, iOS and Android. As said, they all cost money, but you can only pay for the days you use the VPN. The cost of a daily subscription is 49 rubles. License for 1 year - 1690 rubles. Free trial period is 1 day.

is a long-standing VPN application, one of the few that has always provided services for free and without restrictions on the amount of traffic. The limit of 500 Mb per day for “free” use appeared relatively recently. Also, “free” subscribers have access to only one VPN server, which is located in the USA, so the communication speed via Hotspot Shield not too high.

Price paid subscription on VPN Hotspot Shield is $6-16 per month.

Most of us use the Internet daily, for personal or business purposes. Most likely, you have not had any problems with various threats. However, the Internet is not as safe as it seems. Okay, you've got it on WiFi, but what about VPN? Do you need this kind of protection?

A VPN, or virtual private network, is a group of networks or computers connected to each other on the Internet. A VPN allows you to secure your connection by ensuring that everything you send and receive is securely encrypted.

So how can you tell when you need to connect a VPN? Whether you're a student or an employee, if you don't want anyone prying into your business, use a VPN.

There are several types of VPN: The most common types are PPTP VPN, Site-to-Site VPN, L2TP VPN, IPsec, SSL, MPLS VPN and Hybrid VPN. Below we will look at them in more detail.

  1. PPTP VPN

PPTP VPN is a point-to-point tunneling protocol. As the name suggests, PPTP VPN creates a tunnel and captures data. This is the most common VPN type. PPTP VPNs allow you to connect to a VPN network over your existing Internet connection. This type of VPN is great for both business and home use. A password is used to access the network. PPTP is ideal for home and business because it requires no additional hardware and allows for low-cost, uncomplicated applications. PPTP is highly compatible with Windows, Mac and Linux.

And while PPTP VPNs offer many benefits, they are not without their drawbacks. The main one is that the PPTP protocol does not use encryption. In addition, PPTP is based on the PPP protocol, which also does not provide a high level of security.

  1. Site-to-Site VPN

Host-to-host or Router-to-Router is the most common type of VPN in business. This is especially true for companies with offices in different parts one country or in several countries, which allows you to connect all computers in single network. They are also known as intranet VPNs (VPN over an internal network). Another option is also possible. Companies using a peer-to-peer VPN connect to other companies' servers in the same way as an extranet VPN. Speaking in simple language, this type of VPN is a kind of bridge that connects networks in different locations, providing secure connection and internet connection.

Like PPTP, a site-to-site VPN creates secure network. However, there is no dedicated line, so different computers companies can connect to the network. Unlike PPTP, encryption is done either using special devices, or using applications on both ends of the network.

  1. L2TP VPN

L2TP stands for Layer 2 Tunneling Protocol, it was developed Microsoft companies and Cisco. An L2TP VPN is combined with another protocol to provide a more secure connection. With the L2TP protocol, a tunnel is formed between two L2TP connection points, and data is encrypted using another protocol, such as IPsec.

L2TP operates similar to PPTP. The main similarities are the lack of encryption and the basis on PPP protocol. The difference is the protection and safety of data. L2TP based VPNs provide a more secure and reliable connection.

  1. IPsec

IPsec is an acronym that stands for Internet Protocol Security. IPsec is a VPN protocol used to provide network security. The protocol establishes a tunnel to a remote host. Each session is verified and data packets are encrypted, so IPsec provides a high level of connection security. There are two modes in which this protocol operates. Transport and tunnel. Both serve to secure data transfer between different networks. In transport mode, the message in the data packet is encrypted. In tunnel mode, the entire data packet is encrypted. The advantage of using IPsec is that it can be used in addition to other protocols to increase network security.

And although IPsec is a useful and convenient protocol, its main disadvantage is for a long time installing client applications.

  1. SSL and TLS

SSL is a secure sockets protocol, TLS is security over transport layer. They work as one protocol. Both are used to create a VPN. In this connection, the web browser acts as a client, the user gets access to specific applications instead of the entire network. SSL and TSL are used in online sales. SSL and TSL provide a secure session from the browser to the application server. The browser easily switches to SSL without requiring any additional actions from the user's side. Absolute majority modern browsers already includes SSL and TSL. An SSL connection contains https instead of http in the address.

  1. MPLS VPN

VPN services that support Multi-Protocol Label Switching (MPLS) technology are best used for site-to-site connections. This is because MPLS is the most flexible option with maximum possibilities for adaptation. MPLS are based on certain standards used to speed up distribution network packets over multiple protocols. MPLS-enabled VPN services are systems that are VPN services configured to work with Internet service providers, where two or more sites can join together to form a VPN, using the power of the same Internet provider. However, the biggest disadvantage of MPLS-enabled VPN services is the fact that such a network is much more difficult to set up than other VPNs. It is more difficult to make modifications to it. As a result, VPN services with MPLS support are more expensive for users.

  1. Hybrid VPN

A hybrid VPN combines MPLS and IPSec. Both types are used separately on different nodes. However, sometimes a node allows simultaneous connection both types of protocols. This is done to improve the reliability of MPLS using IPSec.

IPSec, as mentioned earlier, requires certain hardware. This is usually a router or multi-purpose security device. With its help, the data is encrypted and forms a VPN tunnel. MPLS are used on the information transmission channel using transmission equipment.

To connect these two types of VPN, a gateway is installed where IPSec is eliminated and the connection to MPLS is made while maintaining data security.

Hybrid VPNs are used by companies because MPLS is often not suitable for their hosts. MPLS provides many benefits over shared connectivity, but comes at a high price. With a hybrid network, you can connect to a central site through a remote site. Hybrid VPNs are the most expensive, but at the same time very flexible in configuration.

conclusions

Overall, choose suitable type VPN is quite difficult. To understand what type of VPN you need, you first need to understand what type of security you want. It also depends on whether you are a student, a small business owner or a large company. You should consider whether a simple security system will suffice or whether a more complex one, such as a hybrid VPN, will be required. Another factor that must be taken into account is cost. How much money are you willing to spend to ensure a secure Internet connection? Once you answer these questions, the choice will become much easier. And, of course, you can always expand your knowledge on this issue. Good luck!

From year to year electronic communication is being improved and information exchange increasingly high demands are placed on speed, security and quality of data processing.

And here we will look in detail vpn connection: what is it, what is a VPN tunnel for, and how to use a VPN connection.

This material is a kind of introductory word to a series of articles where we will tell you how to create a vpn on various operating systems.

VPN connection what is it?

So, a virtual private network vpn is a technology that provides a secure (closed from external access) connection logical network over private or public if you have high-speed Internet.

This network connection computers (geographically distant from each other at a considerable distance) use a “point-to-point” connection (in other words, “computer-to-computer”).

Scientifically, this connection method is called a VPN tunnel (or tunnel protocol). You can connect to such a tunnel if you have a computer with any operating system that has an integrated VPN client that can “forward” virtual ports using the TCP/IP protocol to another network.

Why do you need a VPN?

Basics advantage of vpn is that renegotiators need a connectivity platform that not only scales quickly, but also (primarily) ensures data confidentiality, data integrity, and authentication.

The diagram clearly shows the use of VPN networks.

Rules for connections over a secure channel must first be written on the server and router.

How VPN works

When a connection occurs via VPN, the message header contains information about the IP address of the VPN server and the remote route.

Encapsulated data passing through a shared or public network cannot be intercepted because all information is encrypted.

The VPN encryption stage is implemented on the sender's side, and the recipient's data is decrypted using the message header (if there is a shared encryption key).

After correct decoding messages between two networks, a VPN connection is established, which also allows you to work in a public network (for example, exchange data with a client 93.88.190.5).

Concerning information security, then the Internet is an extremely unsecured network, and a VPN network with the OpenVPN, L2TP / IPSec, PPTP, PPPoE protocols is a completely secure and safe method of data transmission.

Why do you need a VPN channel?

VPN tunneling is used:

Inside corporate network;

To unite remote offices, as well as small branches;

For service digital telephony with a wide range of telecommunications services;

To access external IT resources;

For building and implementing video conferences.

Why do you need a VPN?

VPN connection is required for:

Anonymous work on the Internet;

Downloading applications when the IP address is located in another regional zone of the country;

Safe work in a corporate environment using communications;

Simplicity and convenience of connection setup;

Ensuring high connection speed without interruptions;

Creating a secure channel without hacker attacks.

How to use VPN?

Examples of how VPN works can be given endlessly. So, on any computer on the corporate network, when installing a protected vpn connections you can use mail to check messages, publish materials from anywhere in the country, or download files from torrent networks.

VPN: what is it on your phone?

Access via VPN on your phone (iPhone or any other Android device) allows you to use the Internet in in public places maintain anonymity, as well as prevent traffic interception and device hacking.

A VPN client installed on any OS allows you to bypass many of the provider’s settings and rules (if the provider has set any restrictions).

Which VPN to choose for your phone?

Mobile phones and smartphones running Android OS can use applications from Google Playmarket:

  • - vpnRoot, droidVPN,
  • - tor browser for surfing networks, aka orbot
  • - InBrowser, orfox (firefox+tor),
  • - SuperVPN Free VPN Client
  • - OpenVPN Connect
  • - TunnelBear VPN
  • - Hideman VPN

Most of these programs are used for the convenience of “hot” system setup, placing launch shortcuts, anonymous Internet surfing, and selecting the type of connection encryption.

But the main tasks using a VPN on the phone - this is a check corporate mail, creating video conferences with several participants, as well as holding meetings outside the organization (for example, when an employee is on a business trip).

What is VPN on iPhone?

Let's look at which VPN to choose and how to connect it to your iPhone in more detail.

Depending on the type of network supported, when you first start the VPN configuration on your iPhone, you can select the following protocols: L2TP, PPTP and Cisco IPSec (in addition, you can “make” a VPN connection using third-party applications).

All of the listed protocols support encryption keys, user identification using a password and certification are carried out.

Among additional functions When setting up a VPN profile on an iPhone, you can note: RSA security, encryption level, and authorization rules for connecting to the server.

For iPhone phone From the appstore you should choose:

  • - free application Tunnelbear, with which you can connect to VPN servers any country.
  • - OpenVPN connect is one of the best VPN clients. Here, to launch the application, you must first import RSA keys via iTunes into your phone.
  • - Cloak is a shareware application, since for some time the product can be “used” for free, but to use the program after the demo period has expired, you will have to buy it.

VPN creation: selection and configuration of equipment

For corporate communications in large organizations or associations deleted friend from other offices use hardware equipment capable of supporting continuous, secure work on the network.

To implement VPN technologies, the role of a network gateway can be: Unix servers, Windows server, network router and the network gateway on which the VPN is installed.

The server or device used for creating vpn enterprise networks or vpn channel and between remote offices, must perform complex technical tasks and provide a full range of services to users on both workstations and mobile devices.

Any router or VPN router must provide reliable operation online without any freezes. And the built-in VPN function allows you to change the network configuration for working at home, in an organization or in a remote office.

Setting up VPN on the router

IN general case VPN setup on the router is carried out using the router's web interface. On “classic” devices, to organize a VPN, you need to go to the “settings” or “network settings” section, where you select the VPN section, specify the protocol type, enter the settings for your subnet address, mask and specify the range of IP addresses for users.

In addition, to secure the connection, you will need to specify encoding algorithms, authentication methods, generate agreement keys, and specify DNS server WINS. In the “Gateway” parameters you need to specify the gateway IP address (your own IP) and fill in the data on all network adapters.

If there are several routers in the network, you need to fill out the VPN routing table for all devices in the VPN tunnel.

Here's a list hardware equipment used when building VPN networks:

Dlink routers: DIR-320, DIR-620, DSR-1000 with new firmware or D-Link router DI808HV.

Routers Cisco PIX 501, Cisco 871-SEC-K9

Linksys Rv082 router with support for about 50 VPN tunnels

Netgear router DG834G and routers models FVS318G, FVS318N, FVS336G, SRX5308

Mikrotik router with OpenVPN function. Example RouterBoard RB/2011L-IN Mikrotik

VPN equipment RVPN S-Terra or VPN Gate

ASUS routers models RT-N66U, RT-N16 and RT N-10

ZyXel routers ZyWALL 5, ZyWALL P1, ZyWALL USG