Tri-Lan Home Image

Pricing & Support








Virtual Private Network

Virtual Private Network (VPN) technology is specifically designed to allow individuals and offices to take advantage of the infrastructure of the Internet to achieve inexpensive, secure communications between remote clients and private networks.

Specifically a VPN can be described as the ability to 'tunnel' through the Internet, or any other public network, using encryption technology in a way that provides the same security formerly only available on expensive private networks. It allows a user working at home, or elsewhere, to simply connect to their local Internet service provider and securely link to their remote corporate network as if the user was in the building. Corporations with multiple remote sites each having Internet access can establish private connections between the remote networks to allow clients in each site to share resources in a completely secure environment.

Significant cost-savings can be achieved by using VPN technology to turn the Internet into your own 'virtual' private network. In addition to saving the cost of expensive leased lines and long distance charges, businesses can realize the productivity gains that result in being able to access their data securely from anywhere at anytime.

Remote Client to Private Network

Tri-Net supports Point-to-Point Tunneling Protocol, an Internet Engineering Task Force (IETF) Internet Standard. With a Tri-Net server managing your access to the Internet, remote clients can connect to your office network from a Microsoft Windows client using PPTP.

  • Security provided by the highest levels of encryption.
  • All accesses are logged for an added measure of security.
  • No additional cost.
  • No additional equipment required.
  • Widely available VPN clients.
  • Managed by Tri-Net's point and click interface.

Network to Network Communication

Tri-Net offers secure Office to Office communication using the Linux Free S/WAN (Free source Secure/Wide Area Network) implementation of the IPSEC (Internet Protocol Security) encryption protocols.

These protocols are used to provide both authentication and encryption services. This technology allows organizations to build secure tunnels through 'distrusted' networks. The result is a wide area network that is effectively private even though it includes machines at different locations that are connected by way of the insecure Internet.

The IPSEC protocols were developed by the IETF and will be required as part of IP Version Six, the next generation of Internet Protocols.

Tri-Net Virtual Private Network Illustration

For additional information, see our contact page

Link to System Security


                                    Tri-Lan website developed and maintained by eGraffix Consulting Inc.
                                                             2002 Tri-Lan Internetwork Ltd.  All rights reserved.