![]() Note that this "full enclosure" VPN tunneling approach is a unique feature of GRC's VPN configuration solution. Miles of uncontrolled Internet, the result is exactly as if yourĬomputer were plugged directly into your home base's LAN. to fully enclose and protect the remote machine.Īlthough your remotely located mobile computer may beĬonnected to a hostile network, separated by thousands of Such a tunnel extends the well-managed security of your own home base network across the Internet, through any and all intervening networks, hotspots, WiFi zones, etc. And since you can never be sure of the security of any foreign network you may be visiting even that of a well meaning and trusted friend travelling users are typically subjected to the potential insecurity of whatever network they plug into.Įvery one of these vulnerabilities is eliminated by establishing a strongly authenticated and encrypted "full enclosure" VPN tunnel between the mobile computer and a "home base" computer or network: Even wired hotel networks are susceptible to several types of Ethernet network exploitation which allows all of the hotel's network traffic to be monitored, intercepted, and recorded. Wireless hotspots are notoriously insecure because network traffic is easily "sniffed" right out of the air. ![]() And all of those situations are readily exploited high-risk network environments: Whether its a wireless hotspot, a hotel, a friend's network or other foreign environment, their mobile computers are subjected to any lack of security and malicious activity that may be present. Travelling users generally have very little control over the security of the local network into which they connect their machines. ![]() Strong local/mobile network usage security ![]() GRC's OpenVPN configuration provides the following specific (and often additional) benefits: OpenVPN provides state-of-the-art "end-to-end" authentication and security by completely securing the entire "path in red" shown in the diagram above. GRC's guide for OpenVPN focus upon the goal of securing the mobile user's local network usage environment, and providing secure access to one or more remote computers, or networks, across the public Internet: Virtual private network (VPN) technology provides many different types and scales of solutions, from linking a pair of individual computers to interconnecting multiple large corporate networks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |