{"id":11175,"date":"2016-01-28T09:00:31","date_gmt":"2016-01-28T14:00:31","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=11175"},"modified":"2020-02-27T04:01:07","modified_gmt":"2020-02-26T17:01:07","slug":"vpn-explained","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/vpn-explained\/11175\/","title":{"rendered":"What exactly is VPN?"},"content":{"rendered":"<p>Over the past few months, there has been a lot of hype surrounding Virtual Private Networks or VPN for short. The technology has even found its way into home routers, and some of them even employ hardware-accelerated encryption. So, what is VPN and why do we need it at all? We\u2019ll try our best to explain it without getting too geeky.<\/p>\n<h3>What is VPN?<\/h3>\n<p>Unfortunately, there is no straightforward definition of VPN \u2013 not even in manuals. It\u2019s crystal clear, they say: VPN stands for Virtual Private Network. Sleek, heh? It\u2019s absolutely clear what \u2018network\u2019 is in this case.<\/p>\n<p>\u2018Private\u2019 is also quite straightforward, meaning \u2018not public\u2019. In other words, such network selectively accepts only nodes with certain permissions.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Encryption \u2013 The best approach is to protect your data everywhere and always.  <a href=\"https:\/\/twitter.com\/hashtag\/iteducation?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iteducation<\/a> <a href=\"https:\/\/t.co\/8rRNPbkb8p\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/8rRNPbkb8p<\/a> <a href=\"http:\/\/t.co\/10xneFQeQ2\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/10xneFQeQ2<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/646007885646929920?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 21, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>First, everyone who accesses the private network and all the information they exchange need to be tagged, so the users and data allowed into the private network could be distinguished from the \u2018outsiders. Second, it is crucial to hide this information via encryption.<\/p>\n<p>Third, there is a need to maintain the integrity of this private connection, meaning no outsiders should be allowed into the network, the messages should come only from the trusted sources, and the information should not leak anywhere in plaintext. Basically, it\u2019s all about privacy \u2013 just the way it is implemented at private parties of the uber rich and famous. It\u2019s like a everyone has heard of it, yet no one knows what is going on there.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">7 amazing maps of the Internet ~ <a href=\"https:\/\/t.co\/TmnpLrsAQl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/TmnpLrsAQl<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/eyecandy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#eyecandy<\/a> <a href=\"https:\/\/t.co\/MihEySI83n\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/MihEySI83n<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/661566679818903552?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 3, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As for \u2018Virtual\u2019, it\u2019s rather easy. That means the network is abstracted from the physical substrate (the network thus does not care how many channels it employs, as it works transparently and integrally for all who have access). On the other hand, in most cases the virtual network does not belong to the owner of the physical network.<br>\nFor example, any serious company would require any laptop or mobile device, which connects to any wired or wireless network, to access the corporate network exclusively over the VPN connection. It does not matter how this connection is established \u2013 in most cases, it will employ public connections which even won\u2019t belong to the company. Such connection is called a \u2018tunnel\u2019 \u2013 and mind you, this term would be used multiple times later on.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Free?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Free<\/a> is good, right? What harm can come from free <a href=\"https:\/\/twitter.com\/hashtag\/wifi?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#wifi<\/a>? Worse than you'd think <a href=\"https:\/\/t.co\/HVUd8hLWww\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/HVUd8hLWww<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/sQasdQCYhh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sQasdQCYhh<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/687397550299721729?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 13, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Why do we need VPN?<\/h3>\n<p>The aforementioned example of a remote laptop connected to the corporate network is one of the most ubiquitous scenarios of using VPN in practice. The user feels at home (or, more accurately, feels at work while being at home, on vacations or in a business trip) and can conveniently access corporate data and services.<\/p>\n<p>Moreover, in the security-consciuous enterprises VPN is enabled by default on all devices used by employees. Even Internet access is deployed through the corporate network, heavily surveilled by the security team.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>What exactly is #VPN and why do we need it? #networking #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2Jd1&amp;text=What+exactly+is+%23VPN+and+why+do+we+need+it%3F+%23networking+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The second most ubiquitous scenario is similar to the one above, but in this case it\u2019s not individual users who connect to a corporate network, but the entire branch offices or buildings. The goal is the same: to incorporate remote and distributed locations into a single, connected organization.<\/p>\n<p>Anyone can use VPN to arrange a corporate network: from global enterprises to no-name food trucks stationed all over the city. The VPN can interconnect simple surveillance cameras, alarm systems and the likes of those. With VPN being so simple (since there is no need to stretch a physical cable to all the locations), virtual private networks could function inside one organisation, just for the sake of separating certain departments and systems from one another.<\/p>\n<p>VPNs are frequently used to connect servers and computing clusters to enable better availability and redundancy. The popularity of VPN is related to the proliferation of cloud networking. All the aforementioned solutions are not temporary: such VPNs are usually maintained over many years.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Security concerns arise as subways get wi-fi. <a href=\"http:\/\/t.co\/sEcNTlSqwX\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/sEcNTlSqwX<\/a> Surf safe, but also consider using a <a href=\"https:\/\/twitter.com\/hashtag\/VPN?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#VPN<\/a> <a href=\"http:\/\/t.co\/BR1cYmrIjl\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/BR1cYmrIjl<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/334428011266985986?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 14, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The opposing concept of such permanent VPN connections is session-based connections. They are frequently used to enable access to various services which process sensitive financial, healthcare and legal data.<\/p>\n<p>Well the user would appreciate another practical use scenario. In our tips for securing <a href=\"https:\/\/www.kaspersky.com.au\/blog\/android-maximum-security-tips\/6579\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> and <a href=\"https:\/\/www.kaspersky.com.au\/blog\/iphone-maximum-security-tips\/\" target=\"_blank\" rel=\"noopener noreferrer\">iOS<\/a> devices, we recommended to use a secure VPN connection to a trusted node (your home router of a VPN provider) when connecting to any public network, so your traffic is safe from potential interception by an adversary.<\/p>\n<p>Finally, one more VPN practical use scenario is bypassing certain limitations \u2013 like getting access to web resources which are restricted on the user\u2019s territory or limit their operations to a certain region. According to the <a href=\"http:\/\/www.slideshare.net\/globalwebindex\/gwi-social-report-q4-2014\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">report<\/a> by GlobalWebIndex, in 2014 alone, over 166 million people used VPN to access social networks.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-vpn\">\n<h3>Conclusion<\/h3>\n<p>It is obvious that VPN is useful, helpful, and gains a lot of traction. Of course, we tried to explain this technology in the most comprehensible and easy-to-understand words. In real world, there are many details of both technical and legal nature. Surely, we will also need to analyze popular VPN deployments \u2013 but this is a different story we hope to talk you through next time.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/videoseries?list=PLPmbqO785Hlu-lW7655fc7XxzjGBSdiut&amp;hl=en_US\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?<\/p>\n","protected":false},"author":637,"featured_media":11177,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788,1789],"tags":[261,1134,1303,97,1399,709],"class_list":{"0":"post-11175","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-technology","10":"tag-encryption","11":"tag-internet","12":"tag-networks","13":"tag-security-2","14":"tag-tunnel","15":"tag-vpn"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vpn-explained\/11175\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vpn-explained\/6607\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vpn-explained\/6698\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vpn-explained\/6569\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vpn-explained\/7600\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vpn-explained\/7343\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vpn-explained\/11175\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vpn-explained\/5946\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vpn-explained\/6835\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vpn-explained\/10204\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/vpn-explained\/10635\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vpn-explained\/11175\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/637"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=11175"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11175\/revisions"}],"predecessor-version":[{"id":26812,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11175\/revisions\/26812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/11177"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=11175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=11175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=11175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}