VPN stands for Virtual Private Network. The VPN system allows you to connect any computer to anywhere on the Internet and appear as though your computer is on local network.
It also provides extra security by encrypting data to and from your computer, in effect creating a private tunnel through the Internet for your communication.
Once your data reaches the VPN server, it is then unencrypted by the VPN server. The service could use by all the local network clients
As computer and network involve to our life and businesses the world has changed a lot since last decay we are relays on computer many businesses now have to think about global markets,
many companies have facilities spread out across the country or around the world and there is one thing that all of them need:
A way to maintain fast, secure and reliable communications wherever their offices are.
There are many ways to connect the sites through VPN, it could be always on or demand dial by using any of connection method like XDSL leased line, satellite or Wireless Bridge some type of VPN topologies are bellow.
The connection endpoints of both systems are different from the data endpoints. The IP Security (IP Sec) protocol protects traffic as it travels between the gateways.
However, IP Sec does not protect data traffic on either side of the gateways within the internal networks.
This is a common setup for connections between branches offices because traffic that is routed beyond the branch office gateways, into the internal networks, is often considered trusted
IP Sec protects data traffic as it travels between your gateway and a host in a remote network. VPN does not protect data traffic in the local network because you consider it trusted.