What is a VPN tunnel?

VPN Tunnel Meaning

VPN or VPN Tunnel, are terms tossed around all over the place. But what are they, really? Encryption? Connectivity? A way to hide? Below, I review the meaning of what a VPN tunnel is, and discuss some of the specifics of this familiar but often misunderstood technology.

I’ve heard of a VPN, but what does it do?

A Virtual Private Network is a means to connect to a local, private network from a remote location. Think about it like this: Let’s say you’re off on some grand adventure in some romantic spot in some amazing city. However, before you left for your grand adventure, you were working on an epic meme that you just HAD to share with the internet, but you left it on your computer at the office. If you were at the office, you could easily connect to your computer but alas, you’re not. With VPN technology, you would be able to connect to that computer or any other office resource, like a printer, database or storage server. You would be virtually connected to your private network.

Interesting… So how does it work?

There’s a whole bunch of high-level, technical mumbo jumbo we could throw around but in its simplest form: there are two ends, a server and a client. When configured and connected, these ends form what’s called a “tunnel”. Once this happens, you are a connected workstation. Regardless of where you are in the world, this connection sends traffic over the tunnel and makes it look like you’re connected locally to the network. You can now connect to that printer or get your super important meme off your workstation.

From anywhere? Is that safe?

Yes, you can literally connect from anywhere you have an internet connection. As long as you’re configured and connected, you can pull up a VPN tunnel. And yes, it’s very safe! The tunnel itself is completely encrypted as is all the data that travels across it, end-to-end. Two layers of encryption for the price of one! In fact, Liquid Web’s Security Team and many other big players across the web, like pcmag.com and Forbes, suggest utilizing a VPN for privacy and security; especially when connecting to potentially sensitive resources, like databases. There’s even a way to setup your network so databases are only accessible via a VPN connection, completely hiding their access from the public and adding an extra layer of security.

Sounds awesome! Do I need anything special?

You do! Liquid Web’s Managed VPN Service requires a hardware implementation. That means a hardware firewall and hardware servers. Once configured, you’ll also need a piece of client software. A popular Windows client is Shrew Soft, an open-source and free client. Macs can use their native client and Linux can use VPNC. Once you’re setup our Heroic Support team can even help you configure them so you can be connecting securely in no time.

So! Are you ready? Our Solutions techs are here 24/7 and happy to answer any questions you may have.

Be Sociable, Share!

Author Bio

About the Author: Jerry Vasquez

A self-professed pirate captain with two decades of leadership experience, Jerry has lead teams from 60+ cooks and chefs to 16 Networking engineers in his current role as Liquid Web's Head of Network Operations and Platform. When not working or sleeping, Jerry can usually be found eating and having a good conversation with good people.

Here's 75 % off, Launch a New VPS Today. Find out why 30,000 customers have chosen our Best-in-Class Performance & 24x7 Heroic Support