What is a VPN tunnel?
A VPN or virtual private network creates a connection between you and the internet that surrounds your data like a tunnel, encrypting packets your device sends to another network. VPNs are used to protect your online traffic from snooping, interference and censorship.
Why use VPN?
Establishing the internet connection on unknown public network that anyone can access may cause some risk. As your internet traffic flows inside the VPN tunnel, it provides a secure, private connection between your computer and a different computer or server at another site. When paired with strong encryption, tunneling makes it extremely difficult for your data to viewed or hacked by outside entities. Using VPN increases your privacy and safety while browsing the Internet, doing online banking or accessing your business or home network. It allows you to use geo-blocked websites, hide your IP address and bypass internet censorship.
We use VPN connections betwen remote VOIP phones and PBX systems
How Does VPN Tunneling Work?
It helps to think of VPN tunneling as a two-fold process of data encapsulation and data encryption.
Data encapsulation: Encapsulation is the process of ‘wrapping’ an internet data packet inside of another packet. You can think of this as the outer tunnel structure, like putting a letter inside of an envelope for sending.
Data encryption: However, just having a tunnel isn’t enough. Encryption scrambles and locks the contents of the letter, i.e. your data, so that it can’t be open and read by anyone except the intended receiver.
While a VPN tunnel can be created without encryption, VPN tunnels are not generally considered secure unless they’re protected with some type of encryption. This is why you’ll often hear VPNs described as an encrypted connection.
Several encryption protocols have been created specifically for use with VPN tunnels. The most common types of VPN encryption protocols include IPSec, PPTP, L2TP, OpenVPN, IKEv2, SSTP, and OpenVPN.