VPN Tunnel Meaning
VPN or VPN Tunnel, are terms tossed around all over the place. But what are they, really? Encryption? Connectivity? A way to hide? Below, I review the meaning of what a VPN tunnel is, and discuss some of the specifics of this familiar but often misunderstood technology.
Continue reading “What is a VPN tunnel?”
IPMI stands for Intelligent Platform Management Interface. It is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities on the host systems CPU, firmware and operating system. It defines a set of interfaces used by system administrators for out-of-band management of computer systems.
As an example, IPMI provides a way to manage a server that is powered off or unresponsive by using a network connection to the hardware rather than to the operating system or login shell. This means you can bypass the operating system and log in via console to troubleshoot and get your server back up and running if it goes unresponsive for any reason.
Continue reading “IPMI Dedicated VPN”
Customer Access with IPMI
Remote Desktop Protocol or SSH shell are great for managing your server remotely. But what if you need to do something outside the operating system, like changing network settings or adjusting the BIOS? Those tools cannot help you because they depend on the server’s operating system to function. Wouldn’t it be great to have KVM-like console access to your remote server? With IPMI, you can get browser based access independent of the operating system.
Continue reading “What is IPMI?”
Using a VPN connection to manage your server can have a handful of benefits. Generally the most important benefit to using a VPN is security. When you connect to the Storm VPN your internet traffic to the Liquid Web network will be encrypted.
Your computer will be connecting to your server using a local VPN IP address. If your home IP is blocked you can still use your VPN connection to access the server. It’s important to note that Storm VPN connections cannot be used to access servers outside Liquid Web’s network.
Continue reading “Log In to Storm VPN using ShrewVPN on Windows 8, 8.1 & 10”
Liquid Web offers a free Virtual Private Network (VPN) user with every account. A VPN uses encryption to secure your computer’s connection to the Internet and guarantees that all of the data you’re sending and receiving to the Liquid Web network is secured from any potential prying third parties.
A VPN will secure and encrypt inherently insecure communications (such as HTTP, FTP, SMTP, etc.) to the Liquid Web network, even while using an untrusted public network.
Who uses a VPN? People just like you.
The Professional: Whether working from a permanent home office, or simply getting a few important projects done from home, a VPN will provide secure access to files stored on your dedicated server.
Remote Developers: Do you have a fleet of remote WordPress, Joomla, PHP, Drupal, or other developers that need secure access to your hosting infrastructure? If so, a VPN is not only perfect, but should be required.
The World Traveler: Working on your top secret startup from abroad? Or perhaps uploading photos from your most recent adventure? Prevent snooping by using a VPN.
Once you’re logged into your Liquid Web Manage account, follow the steps below to create a VPN user and get connected! Continue reading “How to Configure Your Liquid Web VPN”
A Virtual Private Network (VPN) can be extremely useful when administering your servers, which is why Liquid Web offers Cisco VPNs with our firewalls. Logging in to the device can vary among operating systems. Here are some instructions for logging into a VPN from Windows systems:
Continue reading “How To: Log In To a Cisco VPN on Windows”
Starting with Mac OS X 10.6 it is now possible to connect to a Cisco IPSec VPN without having to download any extra software.
Continue reading “How To: Mac OS X Cisco VPN Set Up”