VPNs prevent arbitrary third parties from inspecting traffic flow between specific users and the resources they access online. If a third party inspected traffic in transit, it wouldn't be able to access packet payloads. This process makes VPN traffic essentially opaque - meaning unauthorized users can't detect the contents of the network - as it transits the public internet. VPNs add a protocol layer, often called a tunneling protocol, that encapsulates and encrypts network traffic. Before setting up a VPN, network architects should evaluate fundamental VPN principles, select features that best support their organizations' users, and consider best practices for security and secure remote network access.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |