… | |
… | |
12 | |
12 | |
13 | VPN is an acronym, it stands for: |
13 | VPN is an acronym, it stands for: |
14 | |
14 | |
15 | =over 4 |
15 | =over 4 |
16 | |
16 | |
17 | =item X<Virtual> |
17 | =item Virtual |
18 | |
18 | |
19 | Virtual means that no physical network is created (of course), but a |
19 | Virtual means that no physical network is created (of course), but a |
20 | network is I<emulated> by creating multiple tunnels between the member |
20 | network is I<emulated> by creating multiple tunnels between the member |
21 | nodes by encapsulating and sending data over another transport network. |
21 | nodes by encapsulating and sending data over another transport network. |
22 | |
22 | |
23 | Usually the emulated network is a normal IP or Ethernet, and the transport |
23 | Usually the emulated network is a normal IP or Ethernet, and the transport |
24 | network is the Internet. However, using a VPN system like GVPE to connect |
24 | network is the Internet. However, using a VPN system like GVPE to connect |
25 | nodes over other untrusted networks such as Wireless LAN is not uncommon. |
25 | nodes over other untrusted networks such as Wireless LAN is not uncommon. |
26 | |
26 | |
27 | =item X<Private> |
27 | =item Private |
28 | |
28 | |
29 | Private means that non-participating nodes cannot decode ("sniff)" nor |
29 | Private means that non-participating nodes cannot decode ("sniff)" nor |
30 | inject ("spoof") packets. This means that nodes can be connected over |
30 | inject ("spoof") packets. This means that nodes can be connected over |
31 | untrusted networks such as the public Internet without fear of being |
31 | untrusted networks such as the public Internet without fear of being |
32 | eavesdropped while at the same time being able to trust data sent by other |
32 | eavesdropped while at the same time being able to trust data sent by other |
… | |
… | |
34 | |
34 | |
35 | In the case of GVPE, even participating nodes cannot sniff packets |
35 | In the case of GVPE, even participating nodes cannot sniff packets |
36 | send to other nodes or spoof packets as if sent from other nodes, so |
36 | send to other nodes or spoof packets as if sent from other nodes, so |
37 | communications between any two nodes is private to those two nodes. |
37 | communications between any two nodes is private to those two nodes. |
38 | |
38 | |
39 | =item X<Network> |
39 | =item Network |
40 | |
40 | |
41 | Network means that more than two parties can participate in the network, |
41 | Network means that more than two parties can participate in the network, |
42 | so for instance it's possible to connect multiple branches of a company |
42 | so for instance it's possible to connect multiple branches of a company |
43 | into a single network. Many so-called "VPN" solutions only create |
43 | into a single network. Many so-called "VPN" solutions only create |
44 | point-to-point tunnels, which in turn can be used to build larger |
44 | point-to-point tunnels, which in turn can be used to build larger |