ENTERPRISE

How to set up your own virtual private network (Part 1)

3/27/2012 4:40:13 PM

How to set up your own virtual private network (Part 1)

Description: virtual private network

VPN is able to provide a virtual and safe LAN from any distance and number of computers. Darien Graham-Smith will show you how to make it.

Virtual Private Network (VPN) sounds like a boring topic. Even if you don’t know what it means, the concept is easy to understand and technology could be very useful.

To cut the story short, VPN enables two computers or more which originally stayed on the same network – can be a LAN or internet – communicate and share resources safely. It is imaginary because there is no physical infrastructure: traffic sent on the current connection. However, it uses encryption to prevent customers from connecting the virtual network and accessing the content of information package delivered in VPN. That’s why it’s ‘private’.

Benefits of VPN may be not clear immediately. If you just want to safely exchange traffic between guests of the network, of course, there are many ways to do it without establishing the second network. For example, you can use applications supporting SSL encryption, or file and message encryption locally before send them across the network.

However VPN is more flexible. It allows you to share drivers and printers through the virtual connection, and support many protocols such as HTTP and FTP, with complete thoroughness for the operating system and applications. In fact, members of VPN are linked simultaneously with two separate networks.

With networks based on the office, where to access LAN resources could be managed locally, VNP doesn’t seem to be helpful. Nevertheless, it is useful in those situations in which developing a safe physical network is impractical. For instance, if a team is dispersing throughout the country, all members may want to access shared private resources – but sharing confidential data on the public internet could get trouble and using leased dedicated lines to develop secured WAN is an expensive method. With VPN, the team can set up a safe virtual network on the normal internet service of each member.

Virtual private networks can also serve as an extension of its own physical networks, with the support of a VNP gateway server. If a CEO needs to access LAN of the company while traveling, he can use the internet service of the hotel to connect to this gateway server, and once giving appropriate credentials, it transmits the network to the CEO’s laptop, as if it was connected directly to the LAN.

It doesn’t mean that VPN is only useful for employees who are geographically dispersed and who frequently travel by planes. Ability which normal officers work at home easily and safely is not attractive but it’s not unrealistic. VPN may also be useful for ordinary purposes, such as sharing personal documents and media between friends in different houses, or between students in different blocks. Virtual can also helpful for games and enable you to set up online leagues for a lot private players.

Setting up VPN

Theoretic benefits of virtual private network are clear now, but managing a network is challenging and the second virtual network is definitely the same.

And the truth is, VPN technology makes a regular network setting more complicated. Private traffic has to be routed through a protocol such as L2TP (Level 2 Tunnelling Protocol), which encodes VPN information package into UDP. The security provided by a separate protocol which is usually IPsec. All these things need configuring appropriately – in the operating system and may be on router – to allow all VPN clients to communicate securely. Another challenge is that VPN clients are often far apart in terms of geographic, so “try and see” method may not be convenient.

Fortunately, you don’t need to be a network engineer to carry a VPN out. Due to the process is too complex for normal computer users to configure, some network experts – including hardware manufacturers for Cisco and Cyberoam – provide VPN client software handling technical aspects for you. There is also Hamachi which is manufactured by LogMeIn, the developer located in Massachusetts is widely known through remote desktop service. You can try its trial version in http://tinyurl.com/hamachi-trial.

Introduce Hamachi

Description: Description: J:\Online\2012\03\26.03.2012\HTML\Tech_Enterprise_How_to_set_up_virtual_private_network_(Part_1)_files\image002.jpg

Hamachi is a kind of fish in Japanese – amber exactly. Luckily, it’s no need to have profound knowledge to use it. In reality, as the remote access system of LogMeIn, you don’t need to worry about technical network concept, though you should know some main ideas to make use of Hamachi.

Hamachi has some advantages. Firstly, it’s a service based on the internet, so you can’t use it to set up a secure network in the LAN of your company or isolated network at home. If you want to do it, you need to invest into advanced VPN system.

If you just want to form a private VPN for 8 computers, you can install and run free software. With 32 computers maximum, you will have to pay 19USD/year for the standard subscription.

However, if you’re eager to use Hamachi in business environment – where VPN is usually the most useful – you are allowed to evaluate the free service in 14 days. After that, you have to pay for premium subscriptions, with 119USD/year for each subscription, so if you work in large teams, cost for each computer is really low.

Different types of virtual network

Because virtual networks work as same as real networks, they can be arranged in similar connected structures. Hamachi supports 3 organizing models for VPN. The simplest model is “mesh” network, in which all computers are connected each other, setting up a co-ordinate virtual LAN. A “mesh” VPN doesn’t need managing: it can be establish in the moment and exist till 2 computers or more are involved.

A more elaborate network is what Hamachi call “hub-and-spoke”. In contrast with mesh network connected fully, hub-and-spoke network is focused partly or completely. Each member is assigned as a hub or a stroke, and while all members connect to hubs, spokes can’t be connected together. It means that clients are able to share central resources as database or disk storage while being isolated safely from other clients. In fact, hub-and-spoke network with an only hub forms a normal star. Hub-and-spoke network in which all members are hubs is the same with mesh network about functions; hub-and-spoke network without hubs is not a network.

The third type is gateway network – the kind of network is used in the example about the CEO in vacation above. In this model, a computer which is set as gateway is connected with the current LAN, and also establishes VPN. Other clients connect with the gateway through this VPN then transit to access resources on LAN.

Other  
  •  VIRTUALIZATION SOFTWARE
  •  LCD NEC EX201W
  •  Collaborating via Web-Based Communication Tools : Evaluating Web Conferencing Tools
  •  Visual Studio 2010 : Writing Custom Facebook Applications - Querying Data from Facebook
  •  Writing Custom Facebook Applications - Creating Your Application with Visual Studio 2010
  •  Xen Virtualization : Installing Xen from Source
  •  Xen Virtualization : Installing Xen from Binary Packages
  •  Introducing IBM BPM and ESB : IBM SOA Reference Architecture & Introducing IBM WebSphere Process Server
  •  Introducing IBM BPM and ESB : Achieving success through BPM enabled by SOA
  •  Separating BPM and SOA Processes : Example-Process for Handling Credit Card Disputes
  •  Separating BPM and SOA Processes : The Model Stack & Design Tips on Separating BPM and SOA
  •  BizTalk 2006 : Editing and Resubmitting Suspended Messages (part 2) - Pseudo-Walkthrough to Perform Edits and Resubmits
  •  BizTalk 2006 : Editing and Resubmitting Suspended Messages (part 1)
  •  BizTalk 2006 : Building a Resequencing Aggregator
  •  Windows System Programming : Listing Registry Keys and Contents
  •  Windows System Programming : Registry Management
  •  .NET Debugging : PowerDbg (part 2) - Send-PowerDbgCommand & Extending PowerDbg
  •  .NET Debugging : PowerDbg (part 1) - Installing PowerDbg & Analyze-PowerDbgThreads
  •  Sharepoint 2010 : Business Connectivity Services Deployment Types (part 3) - Configure Indexing & Performing a Search
  •  Sharepoint 2010 : Business Connectivity Services Deployment Types (part 2) - Creating a Profile Page to Display BCS Results
  •  
    Top 10
    Windows Vista : Installing and Running Applications - Launching Applications
    Windows Vista : Installing and Running Applications - Applications and the Registry, Understanding Application Compatibility
    Windows Vista : Installing and Running Applications - Practicing Safe Setups
    Windows Server 2003 : Domain Name System - Command-Line Utilities
    Microsoft .NET : Design Principles and Patterns - From Principles to Patterns (part 2)
    Microsoft .NET : Design Principles and Patterns - From Principles to Patterns (part 1)
    Brother MFC-J4510DW - An Innovative All-In-One A3 Printer
    Computer Planet I7 Extreme Gaming PC
    All We Need To Know About Green Computing (Part 4)
    All We Need To Know About Green Computing (Part 3)
    Most View
    All You Need To Know About iOS 6 (Part 3)
    Upgrade Power - Guidelines For PSU Buyers (Part 4) - Cooler Master Silent Pro Gold 800W, Corsair Enthusiast Series Modular TX850M
    Just My Type (part 2) - ZAGGfolio,Writer Plus, keyPAD, Professional Workstation
    VLC Player : What Tricks This Great Little Player Can Do
    How To Buy…A NOTEBOOK PC (Part 2)
    Design and Deploy High Availability for Exchange 2007 : Design Edge Transport and Unified Messaging High Availability
    ROG G55VW Gaming Laptop
    The Best iPad Cases
    Troubleshooting Reference : Tablets & Smartphones
    Externalizing BLOB Storage in SharePoint 2010 (part 1)
    Dell Inspiron 14R 5420 Review (Part 1)
    Top 10 Smartphones August – September (Part 1) - Samsung Galaxy S III, HTC One X, Apple iPhone 4S,Nokia Lumia 800,Sony Xperia S
    H8-1090D Desktop PC - Elite Class
    Ditch Your Laptop For Your Phone (Part 2)
    Algorithms for Compiler Design: THE ARRAY REFERENCE
    Managing SharePoint 2010 Data : Content Types
    Seagate Backup Plus Portable HDD
    Samsung LED TV ES8000 - The SMART in Smart TV
    Lenovo IdeaPad Z580 - Keeps Up The Tradition
    Windows Server 2008 Server Core : Working with Scripts - Using the Scripting Objects