VPN | |||||
|
Virtual Private Network Virtual Private Network (VPN) technology is specifically designed to allow individuals and offices to take advantage of the infrastructure of the Internet to achieve inexpensive, secure communications between remote clients and private networks. Specifically a VPN can be described as the ability to 'tunnel' through the Internet, or any other public network, using encryption technology in a way that provides the same security formerly only available on expensive private networks. It allows a user working at home, or elsewhere, to simply connect to their local Internet service provider and securely link to their remote corporate network as if the user was in the building. Corporations with multiple remote sites each having Internet access can establish private connections between the remote networks to allow clients in each site to share resources in a completely secure environment. Significant cost-savings can be achieved by using VPN technology to turn the Internet into your own 'virtual' private network. In addition to saving the cost of expensive leased lines and long distance charges, businesses can realize the productivity gains that result in being able to access their data securely from anywhere at anytime. Remote Client to Private Network Tri-Net supports Point-to-Point Tunneling Protocol, an Internet Engineering Task Force (IETF) Internet Standard. With a Tri-Net server managing your access to the Internet, remote clients can connect to your office network from a Microsoft Windows client using PPTP.
Network to Network Communication Tri-Net offers secure Office to Office communication using the Linux Free S/WAN (Free source Secure/Wide Area Network) implementation of the IPSEC (Internet Protocol Security) encryption protocols. These protocols are used to provide
both authentication and encryption services. This technology allows
organizations to
build secure tunnels through 'distrusted' networks. The result is a wide
area network that is effectively private even though it includes machines
at different locations that are connected by way of the insecure Internet.
For additional information, see our contact page
|