{"id":120,"date":"2020-02-21T23:41:37","date_gmt":"2020-02-21T23:41:37","guid":{"rendered":"https:\/\/www.whatismypublicip.com\/blog\/?p=120"},"modified":"2023-01-03T20:15:36","modified_gmt":"2023-01-03T20:15:36","slug":"what-is-a-vpn","status":"publish","type":"post","link":"https:\/\/www.whatismypublicip.com\/blog\/what-is-a-vpn\/","title":{"rendered":"What is a VPN?"},"content":{"rendered":"\n<figure class=\"wp-block-gallery aligncenter columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"334\" src=\"https:\/\/www.whatismypublicip.com\/blog\/wp-content\/uploads\/2020\/02\/What-Is-a-VPN-What-Is-My-Public-IP.jpg\" alt=\"What Is a VPN\" data-id=\"122\" data-link=\"https:\/\/www.whatismypublicip.com\/blog\/what-is-a-vpn\/what-is-a-vpn-what-is-my-public-ip\/\" class=\"wp-image-122\"\/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>A VPN network (virtual private network or virtual private\nnetwork) is a tunnel which unites us safely to another network. Further, the\ndata is encrypted so that communications cannot be intercepted.<\/p>\n\n\n\n<p>It is a form of a secure connection within an insecure\nenvironment, such as the Internet.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Is it secure communication?<\/h1>\n\n\n\n<p>All the information that is transmitted by that \u201cvirtual\ncable\u201d or better called a tunnel. It is encrypted from end to end and is\ntherefore secure.<\/p>\n\n\n\n<p>Even when that VPN tunnel is created using Internet\nresources, it is a secure medium.<\/p>\n\n\n\n<p>The VPN network offers us end-to-end encryption.<\/p>\n\n\n\n<p>Although we connect through a public Wi-Fi, once the tunnel\nis established, communications will be transmitted securely (this does not exclude\nthat other security factors should be considered). Besides, it is independent\nof the type of connections used to access.<\/p>\n\n\n\n<p>You can establish the tunnels can with PCs and, of course,\nalso with mobile devices.<\/p>\n\n\n\n<p>There are numerous apps for both Android VPN and IOs. These\ndevices connect against a VPN server, which can be a dedicated computer, a\nfirewall, a router, etc.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">VPN networks vs. Remote control software<\/h1>\n\n\n\n<p>VPN connections are sometimes confused with remote control\nprograms.<\/p>\n\n\n\n<p>Depending on the software used, they also allow secure\naccess to remote resources. However, its applications and ways of working are\nvery different.<\/p>\n\n\n\n<p>With a remote control program, we can access our office\nequipment and use it as if we were in front of that equipment. The\ncommunication established should be safe too. Controlling the office equipment\nimplies having a team in the office to connect.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The Advantages of Using VPNs<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Securely access another network.<\/h2>\n\n\n\n<p>Especially useful in the case of mobile users (commercial,\nwork from home &#8230;).<\/p>\n\n\n\n<p>We want employees to be able to access files, applications,\nprinters, and other resources in the office network.<\/p>\n\n\n\n<p>As the company&#8217;s network is accessed by many, security must\nbe fundamental.<\/p>\n\n\n\n<p>We need a tunnel server in the office: Usually, the firewall\nor a team dedicated to these tasks.<\/p>\n\n\n\n<p>And also, we need a VPN client on the user&#8217;s computer, which\nis going to connect: the most widespread is OpenVPN, which is available for all\nplatforms (Windows, iOS, Android, Linux, etc.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Connect several networks.<\/h2>\n\n\n\n<p>By joining the delegations, workers can use the resources\ninterchangeably as if both offices were linked with a cable.<\/p>\n\n\n\n<p>At the same time, the limitations, restrictions, access\ncontrol, etc. that can be created in a conventional network can be established.<\/p>\n\n\n\n<p>In this case, we need to create a VPN called: Site to site.<\/p>\n\n\n\n<p>It is generated between 2 devices. Usually, between the\nfirewalls or router of each office.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Maintain privacy if we connect to a public or untrusted network.<\/h2>\n\n\n\n<p>As are the Wifi access points of hotels and shops, it is an\naspect Especially recommended for those people who move.<\/p>\n\n\n\n<p>The most reasonable thing, when we go on a trip, is to look\nfor available Wi-Fi networks. From them, we access our data: email, messaging\nprograms, business applications, etc.<\/p>\n\n\n\n<p>As of this circumstance, cybercriminals are also aware. It\nis one of the most common attack vectors:<\/p>\n\n\n\n<p>Simulate legitimate networks to connect unsuspecting users\nand steal credentials, accesses, identities, browsing data, etc.<\/p>\n\n\n\n<p>A good practice is to access our network via a VPN from that\n\u201cFree Wifi.\u201d From there, we will be connected to the office, and our Internet\naccess will be that of our business (as safe or insecure as it is, of course).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A VPN network (virtual private network or virtual private network) is a tunnel which unites us safely to another network. Further, the data is encrypted so that communications cannot be intercepted. It is a form of a secure connection within an insecure environment, such as the Internet. Is it secure communication? All the information that&#8230; <a class=\"read-article\" href=\"https:\/\/www.whatismypublicip.com\/blog\/what-is-a-vpn\/\">Read Article &#8594;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-120","post","type-post","status-publish","format-standard","hentry","category-general-information","category-ip-tools"],"_links":{"self":[{"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"predecessor-version":[{"id":126,"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/posts\/120\/revisions\/126"}],"wp:attachment":[{"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whatismypublicip.com\/blog\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}