VPN Tunnel Meaning
The terms VPN or VPN Tunnel are tossed around all over the internet these days, but what are they really?
A method to hide online activity?
In this article, we review what a VPN tunnel is, and discuss some specifics of this familiar but often misunderstood technology.
I’ve heard of a VPN, but what does it do?
A Virtual Private Network is a means to connect to a local, private network from a remote location. Think about it like this: Let's say you’re off on some grand adventure in some romantic spot in some amazing city. However, before you left for your grand adventure, you were working on an epic meme that you just HAD to share with the internet, but you left it on your computer at the office. If you were at the office, you could easily connect to your computer but alas, you’re not. With VPN technology, you would be able to connect to that computer or any other office resource, like a printer, database or storage server. You would be virtually connected to your private network.
Interesting… So, how does it work?
There’s a bunch of high-level, technical mumbo jumbo we could throw around but in its simplest form: there are two ends, a server and a client. When configured and connected, these ends form what’s called a “tunnel”. Once this happens, you are a connected workstation. Regardless of where you are in the world, this connection sends traffic over the tunnel and makes it look like you’re connected locally to the network. You can now connect to that printer or get your super important meme off your workstation.
From anywhere? Is that safe?
Yes, you can literally connect from anywhere you have an internet connection. As long as you’re configured and connected, you can pull up a VPN tunnel. And yes, it’s very safe! The tunnel itself is completely encrypted as is all the data that travels across it, end-to-end. Two layers of encryption for the price of one! In fact, Liquid Web’s Security Team and many other big players across the web, like pcmag.com and Forbes, suggest utilizing a VPN for privacy and security; especially when connecting to potentially sensitive resources, like databases. There’s even a way to set up your network so databases are only accessible via a VPN connection, completely hiding their access from the public and adding an extra layer of security.
Sounds awesome! Do I need anything special?
You do! Liquid Web’s Managed VPN Service requires a hardware implementation. That means a hardware firewall and hardware servers. Once configured, you’ll also need a piece of client software. A popular Windows client is Shrew Soft, an open-source and free client. Macs can use their native client and Linux can use VPNC. Once you’re set up, our Heroic Support team can even help you configure them so you can be connecting securely in no time.
So! Are you ready? Our Solutions techs are here 24/7 and happy to answer any questions you may have.
- What is CentOS? Everything You Need to Know
- Check Apache Status with systemctl status and apachectl status Commands
- How to Find the Server Name Indication (SNI) Supporting Details
- How to Install Pip on CentOS 7
- Get Kernel Version for Linux: A Guide
- What Is a Time Series Database? How It Works & Use Cases
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.