dslreports logo

VPNs create "virtual" point-to-point connections using a technique called tunneling.

As the name suggests, tunneling acts like a "pipe" which penetrates through a network to connect two points. Normally activated by remote users, tunneling encrypts data into standard TCP/IP packets and encapsulates it for safe transmission across the Internet.




VPN ensures the confidentiality and integrity of information as it travels over the public internet because it requires:

Remote user identity authentication

Secure private transmission of data (no unauthorized listeners

Verification of unadulterated data transmission



The VPN connection behaves like this:

You connect to the Internet in the normal manner, through your ISP.

The VPN client software on your computer initiates a connection with the VPN server.

The VPN server encrypts the data on the connection so it cannot be read by others while it is in transit.

The VPN server decrypts the data and passes it on to other servers and resources.


Feedback received on this FAQ entry:
  • you have not explained about the different errors on vpn issues like 1. remote host not found, 2. host not responding, 3. enter credentials like passcode..........

    2009-12-09 05:02:54



Expand got feedback?

by KeysCapt See Profile
last modified: 2002-09-28 15:09:50