A single, secure, logical network that uses tunnels across a public network such as the Internet.
A network that is constructed using public systems such as the Internet, but uses security mechanisms to ensure privacy, so that only authorized users are allowed access.
extends your corporate network out of your building via the Internet. A VPN allows employees, customers or vendors to access your local network via the Internet. This is a secured pipe into the main office from across the street or across the world. With VPN client software running on a laptop and an Internet connection, your salesmen or any office employee can get email, retrieve documents, and even run server applications.
Carrier-provided service that offers capabilities similar to private lines (conditioning, error testing and high-speed, full-duplex, four-wire transmission) with line quality adequate for data transmission. Provides on-demand dial-up circuits or bandwidth that can be dynamically allocated.
An encrypted connection across the Internet that provides a secure circuit between machines over the public Internet.
A logical (that is, artificial or simulated), retricted-use network that is constructed from the resources of a relatively-public physical (that is, real) network, often by tunneling links of the virtual network across the real network and often by using encryption located at hosts or gateways to protect the tunnels. A VPN can be built on the Internet, creating a cost-effective backbone that fully connects several sites and eliminates the need for expensive leased lines between the sites.
A private network within a public network, usually on the Internet. Privacy for the virtual network is achieved through encryption and provides a less expensive option than using dedicated lines. See PPTP.
is a private communications network usually used within an organization, or by several different organizations, communicating over a public computer network. VPN message traffic is carried over the Internet.
A secure internetwork connection between two geographically separate LANs provided by a public network such as the Internet. The connection emulates a LAN connection, thus reducing or eliminating the need for a private WAN link.
A private network that is configured within a public network (a carrier's network or the Internet) in order to take advantage of the economies of scale and management facilities of large networks. VPNs are widely used by enterprises to create wide area networks (WANs) that span large geographic areas, to provide site-to-site connections to branch offices and to allow mobile users to dial up their company LANs. For years, common carriers have built VPNs that appear as a private national or international network to each customer, but, in fact, are sharing the same physical backbone trunks with many customers. VPNs have been built over X.25, Switched 56, frame relay and ATM technologies as well as IP networks. For added security, encryption is often used. Encrypted connections over the Internet are also very popular for linking remote offices and mobile users; however, for top secret communications, the maximum security is still only afforded by networks of totally private lines.
Using an existing public telecommunications infrastructure to create a private, secure data network.
A client across a public network such as the Internet may appear to be part of a private network by encapsulating the private packets inside public packets which are routed in the normal way to a device (typically a firewall) on the private network which unpacks them and sends them on the private network, a process known as tunnelling. The tunnel can exist at the data link layer using Point to Point Tunnelling Protocol (PPTP) or the IETF standard Layer 2 Tunneling Protocol (L2TP) from RFC 2661, or at the IP layer using IETF-defined IP Security (IPsec) protocol extensions from RFC 2402 and RFC 2406. There should also be some form of authentication and authorisation, and encryption of at least the authentication process (and preferably data transfers too) so IPsec is the most desireable method.
A technical strategy for creating secure connections, or tunnels, over the Internet.
VPN - The extension of a private network that provides encapsulated, encrypted, and authentic logical (not physical) links across shared or public networks. VPN connections typically provide remote access and router-to-router connections to private networks over the Internet.
Edit / VPN - A network in which private traffic is encrypted and sent over less private networks. Because the data is encrypted before being placed on the network, virtually secure ("private") connections can be enjoyed over public WANs, even over the Internet. This is sometimes called tunneling, because a private encrypted channel is tunneled through a public channel. At this writing, the trend is to tunnel VPN traffic through public Internet connections using SSL to do the encryption. See Also: Encryption Decryption Cryptography
A network that uses public wires and security protocols to allow private communication between remote nodes.
VPN enables a secure private connection via a public network, for example, the Internet.
A theoretically safe area on the ‘Net in which secure transactions can take place.
Virtual Private Network is a communications service on a shared public network infrastructure that provides customized operating characteristics uniformly and universally. VPN is most used to refer to voice virtual private networks. Internet Protocol (IP)-based data services are referred to as data VPNs. A virtual private network may also be a wide-area network (WAN) of permanent virtual circuits, generally using asynchronous transfer mode (ATM) or frame relay to transport IP. Also, the use of encryption software or hardware to bring privacy to communications over a public or untrusted data network. VPNs are segmented into three categories: remote access VPNs, intranet VPNs, and extranet VPNs - each with different security and bandwidth management issues to consider.
A virtual private network is used to secure communications between two sources over the Internet.
This uses the Internet to give remote offices or individuals secure access to their organisation's network. It is a cheaper option than connecting offices with owned or leased lines.
Private network configured inside a public network. A VPN combines the security of a private network with the economies of scale and built-in management capabilities of a public network.
Private, software defined network dedicated to connecting two or more high volume, long distance client sites.
special combination of encryption, authentication, and protocol tunneling technologies that provide secure transport of private communications over the public Internet. Most enterprises rely, on third-party companies to host their VPNs.
This network is not accessible for the public, but uses the facilities of a public network.
is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
a cheaper alternative that will maintain the same security
a combination of tunneling, encryption, authentication, and access control technologies and services used to carry traffic over the Internet and the UAB campus network
a communications solution that enables users at multiple locations to securely access data and network services on remote networks
a computer network that uses a public network (for example, the Internet) to transport private data
a means of achieving a secure connection between two computers using the internet
a means of connecting to a private network (such as your office network) by way of a public network (such as the Internet)
a means of creating a secure connection, over the public Internet, between your computer and a gateway or server located on campus
a mechanism used to build network interconnectivity over a public network using encrypted 'tunnels'
a method of accessing the private network in a secure way over public communication lines and networks
a method to connect computer systems using public wires
an allocated amount of bandwidth on the public Internet where public access is prevented through encryption
an encrypted channel that typically allows a remote user with a laptop or notebook computer to access either a corporate network, or specific corporate applications, using a secure (encrypted) channel
an encrypted tunnel between two computers or networks that provides a high level of security for sharing files, printers, and other network resources over an unsecure network like the Internet
a network that operates over a public means such as the Internet, but has secure transmission by using tunneling protocols and security practices
a network which uses encryption to provide a secure connection through an otherwise insecure network, typically the Internet
a private communications network usually used within a company or by several or client and the host network or server
a private data network that makes use of the public telecommunication infrastructure, maintaining privacy by encrypting data before sending it through the public network and decrypting it at the receiving end
a private data network that makes use of the public telecommunication infrastructure (typically the Internet), maintaining privacy through the use of a tunnelling protocol and security procedures
a private data network that uses the public telecoms infrastructure
a private network that makes use of a public network such as the Internet while maintaining security and privacy through encryption and security procedures
a private network that uses a public network (usually Broad band) to
a private network that uses public network (such as the internet) to communicate
a private, secure tunnel through the internet which companies can use as a WAN to connect geographically dispersed users, customers and business partners, without having to worry about intruders and curious outsiders
a secured and encrypted tunnel between two devices that are attached to an insecure network such as the Internet
a secured private network connection that is established on top of publicly accessible infrastructure, such as the Internet or the public telephone network
a secure link between sites across the public Internet
a secure network in which data may traverse insecure or untrusted networks
a secure private internal network used by an organization to share information and enhance internal communication
a secure way of providing remote access to your company network, using the internet and encryption technology
a security structure that utilizes a program to provide secure, encrypted channels between LEO users and the applications and data contained with the LEO network
a set of secure tunnels over a public medium such as the Internet used to connect multiple networks
a way of achieving private networking over the public Internet
a way to connect multiple private networks over a medium, such as the internet
Private network built atop a public network. Hosts within the private network use encryption to talk to other hosts; the encryption excludes hosts from outside the private network even if they are on the public network.
A data network created by companies using the Internet with secured protocols to preclude unauthorized access.
A private network created within a public network, such as the Internet. The LiveVault Online Backup Service VPN tunneling technology uses encryption and signing to create a private connection over a public network to ensure safe and secure backup and restore operations.
a public network that uses security techniques to simulate a private network, generally slower in performance but lower cost
Provides the functions and features of private networks without the need for dedicated private lines between corporate sites. Sites connect to the network provider's network rather than directly to another corporate location.
a private network created within a public network through the use of encoding, passwords and other ways to limit access.
A technology that allows private, secure network connections between remote locations over the Internet. A VPN appears as a private network to the customer but uses the public network as its backbone. See also Remote Access.
A group of secure paths over the Internet that provide authorized users a secure means of accessing a private network via the Internet.
or VPN - A VPN can connect two businesses, such as a franchise and its headquarters, by using dedicated lines that are connected to ISP's. Traffic may be encrypted and authentication is used on either end.
VPN is a method for sending and receiving secure information over a public network. When connected to Cal Poly Pomona through the VPN, your computer has all the same privileges it would have were it physically located in your office.
A system of two or more private networks connected over a public telecommunications infrastructure such as the Internet. The Cal Poly Pomona VPN service provides an off-campus individual secured access to resources typically reserved for on-campus use only.
A wide-area network interconnected by common carrier lines or that uses the Internet as its network transport.
A VPN is a switched network with special services such as enabling customers to call between offices in different area codes or nations while dialing a minimum of digits. Carriers are enhancing VPN service offerings by combining inbound and outbound services under one package.
A Virtual Private Network (VPN) is a private connection between two machines that sends private data traffic over a shared or public network, the Internet. VPN technology lets an organization securely extend its network services over the Internet to remote users, branch offices, and partner companies.
utilises a public network, such as the Internet, to transmit private data. VPNs are an emerging form of extranet implementation that may become a viable replacement for traditional wide area networks (WANs). (p. 275)
A network that uses data encryption to allow secure access over the internet. This is cheaper than connecting offices by owned or leased lines
A network that is not connected to any public network (like the Internet) for reasons such as security, network addressing, and traffic control.
Usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is "virtually" private. A typical example would be a company network where there are two offices in different cities. Using the Internet, the two offices merge their networks into one network but encrypt traffic that uses the Internet link.
A data network that uses the public telecommunications infrastructure, but maintains privacy through the use of a tunneling protocol and security procedures. A VPN gives a company the same capabilities as a system of owned or leased lines to which that company has exclusive access. However, costs are much lower because the VPN uses the shared public infrastructure rather than exclusive line access.
The use of a public network, such as the Internet, to provide for secured traffic between trusted computers via a process of encryption.
a private network that uses the infrastructure of public networks. The VPN encapsulates, encrypts, and authenticates data flows to restrict access and prevent data interception.
Network facility provided over one or several public networks for a closed user group. It responds to a need for both internal communication (within the user group), and external communication (to public network users). For businesses whose sites are spread over a wide area, the virtual private network can function like a private network, with its own private numbering plan. In this case it is an attractive alternative, as it saves the business from investing in a costly private automatic branch exchange (PABX).
A system that delivers information and communications between businesses and trading partners over a shared public network infrastructure in a secure manner.
A network dedicated to a specific user or graoup of users that is part of a public network. For example, there are a number of systems that enable users to create dedicated networks using the Internet as the backbone for transporting data
Virtual private networks are secured private network connections, built on top of publicly-accessible infrastructure, such as the Internet or the public telephone network.
The extension of a private network that encompasses links across shared or public networks, such as the Internet.
Allows remote computers to connect to a common network via a medium such as the Internet as if the remote computer was locally connected to the network in a secure manner.
A network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
A secure private network that uses the public telecommunications infrastructure to transmit data. VPNs are used by enterprises for both extranets and wide area intranets.
Secure connections between sights by using data encryption over the Internet. It is like having a private, dedicated leased line, but "virtually" through the Internet.
An outsourced remote Internet access system. VPNs allow remote users to connect securely to an ISP or a private IP network via an encrypted tunnel cordoned off from the public portions of the Internet. A VPN is generally less expensive for a company than building and operating its own dedicated network.
A virtual private network (VPN) is an encrypted tunnel between two organizations (or hosts) that enable secured communication to occur over public networks. This tunnel allows a variety of different types of traffic, which distinguishes a VPN from an encrypted connection. For more information, see: http://www.whatis.com/vpn.htm.
A private network of computers at least partially connected by public phone lines. An example is a private office LAN that allows users to log in remotely over the Internet (an open public system). VPNs use encryption and secure protocols such as PPTP to ensure that unauthorized parties do not intercept data transmissions.
A private data network using the public telecommunications infrastructure with security procedures that maintain privacy.
(VPN) VPN is Microsoft's implementation of Point-to-Point Tunnelling Protocol (PPTP), a protocol that provides a secure connection via the Internet. Virtual Private Networks allow computers to use the public Internet backbone as a channel for private data communication. With encryption and encapsulation technology, a VPN creates a private passageway through the Internet. VPNs allow remote offices, company road warriors, and even businesses' customers to use the Internet, rather than pricey private lines, to reach company networks.
Virtual Private Network. This allows a secure, encrypted connection between two points over the Internet.
Usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is "virtually" private. VPNs use the public Internet backbone and private data networks to replace costly leased line facilities. Industry experts estimate that VPNs typically reduce telecommuting costs by as much as 70% and branch office connections by 30%. VPNs incorporate tunneling, encryption, encapsulation, packet authentication, user authentication, access control and quality of service to insure the secure and timely delivery of your data.
A secure, encrypted private Internet connection.
Enables IP traffic to travel securely over a TCP/IP network by encrypting all traffic from one network to another. Tunneling is used to encrypt all information at the IP level.
In a wireless environment, anyone within range of your computer antenna can see what you're doing unless you take steps to protect yourself using VPN, or virtual private network technology, an additional piece of software typically used in corporate/institutional environments. At the University of Minnesota you can use it to get into the network if you have an account with the University.
Service for business communication whereby departments and offices at different locations are connected via switchboard and Centrex solutions in a company-wide network via switched connections in the public telecommunication network.
A private network that uses the Internet to connect remote sites or users and that utilizes advanced security techniques to create secure communications.
A "virtual" network constructed by connecting computers together over the Internet and encrypting their communications so that other people cannot understand the communications.
Allows business-to-business transactions using a "secure tunnel" through the public Internet. More attractive than EDI because it is cheaper and does not use highly proprietary leased private lines nor VANs. Return to the top
A capability that allows users to create their own private information network.
A restricted-use, logical computer network that is constructed from the system resources of a relatively public, physical network (such as the Internet).
Virtual Private Network, VPN is a type of network that allows a user to connect to a network through a tunneling protocol and access internal Internet and intranet web sites and e-mail. Virtual Private Networks are commonly used to allow an employee with a large company to connect to the companies intranet.
A mechanism used to communicate privately over the public telecommunication infrastructure. Each VPN is set up between two points, with each one being referred to as a VPN termination point. All information sent between the two termination points (as well as information about the termination points themselves) is secured by being strongly encrypted in a process known as tunnelling.
VPN software allows an Internet user to safely connect to a remote network, typically the internal network of their employer, using the public Internet. This is done by establishing a secure connection that encrypts the data being sent and received.
A VPN is a software defined private network. A way to deliver private data safely over a public network, such as the Internet. The data traveling between two hosts are encrypted for privacy.
The use of encryption in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the Internet. VPNs are generally cheaper than real private networks using private lines but rely on having the same encryption system at both ends. The encryption may be performed by firewall hardware or software or possibly by routers.
A private data network that makes use of a public network, such as the Internet, by encrypting data at one node and using security procedures that provide a "tunnel" through which the data can pass to another node.
The use of encryption to provide a secure connection through which to send data from one computer to another, over an otherwise insecure network, like the Internet.
Protocol over which IP traffic of private address space can travel securely over a public TCP/IP network. A VPN uses tunneling to encrypt all information at the IP level. See also VRF.
A private network that is configured within a public network. VPNs enjoy the security of a private network via access control and encryption, while taking advantage of the economies of scale and built-in management facilities of large public networks.
A private communications network existing within a shared or public network platform (i.e. the Internet).
A switched network with special services such as abbreviated dialing, which allows customers to call between offices in different area codes or different country codes by dialing as few as seven digits.
A secure connection created over a public network by using tunneling-mode encryption. Abbreviated VPN.
A virtual private network (VPN) is a private network designed to promote and maintain privacy through the employment of tunneling protocols.
Private network constructed using public wires, such as the Internet, for users of a single company. These networks use encryption and other security mechanisms to ensure that only authorized users can access the network and data.
Enables IP traffic to possess and ensure secure connectivity over a public TCP/IP network by encrypting all traffic from one network to another. A VPN uses tunneling to encrypt all information at the IP level.
A virtual private network is what it says-a private network of computers that's partially connected over public phone lines. Encryption and secure protocols permit VPN users to transmit data secure in the knowledge that the data will be difficult, if not impossible, to intercept by unauthorized third parties. This technology allows VPN users to communicate with the assurance of total privacy and safety of data and information while cutting the cost of traditional leased telephones lines by 90-95%.
A network that uses public network infrastructure - usually the internet - but is made to act like a Private Network by use of PPTP and other security protocols. VPNs are less expensive than private networks. Companies use VPNs to allow employees who are telecommuting or traveling to access the company's intranet. It is also used to secure a company's Extranet.
A network service offered by public carriers in which the customer is provided a network that in many ways appears as if it is a private network (customer-unique addressing, network management capabilities, dynamic reconfiguration, etc.) but which, in fact, is provided over the carrier's public network facilities.
A VPN is a link through which two sites can communicate privately over a network; no one outside the VPN can intercept their data or add their own data to the connection. VPNs can run on public telecommunications infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. A VPN gives a company the same connectivity and security they would experience if they installed their own dedicated connections – but VPNs generally are cheaper because they can use shared public infrastructure (Alberta SuperNet, for example).
A secure method of transmitting data. These are becoming increasingly popular for Internet users, enabling mission-critical information to be safely transmitted.
A networking technology used to send data securely over public data networks.
The standard mode for communicating with AIS mainframe systems from untrusted networks. VPN provides an encrypted telnet session when dialing in from home or off-campus.
A data network that uses the public communications infrastructure, but maintains privacy by using special communications protocols and security procedures.
A private data network that makes use of the public telephone infrastructure. Privacy is maintained by the use of a tunneling protocol, encryption, and other security features.
The extension of a private network that encompasses encapsulated, encrypted, and authenticated links across shared or public networks. VPN connections can provide remote access and routed connections to private networks over the Internet. See also: authentication; encryption; remote access; routing; tunnel
A term that is applied to either voice or data networking. In essence, a VPN is a portion of a public network that has been logically partitioned for private use.
n. 1. A set of nodes on a public network such as the Internet that communicate among themselves using encryption technology so that their messages are as safe from being intercepted and understood by unauthorized users as if the nodes were connected by private lines. 2. A wide area network formed of permanent virtual circuits (PVCs) on another network, especially a network using technologies such as ATM or frame relay. See also ATM (definition 1), frame relay, PVC. Acronym: VPN.
Virtual Private Network (VPN) is a network that is constructed by using public wires to connect nodes. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
Method whereby a public telecommunications infrastructure such as the internet is used to offer remote users access to an organisation's network while safeguarding the privacy and security of the transmitted messages.
A virtual private network (VPN) is a private communications network often used within a company, or by several companies or organizations, to communicate confidentially over a public network. VPN traffic can be carried over a public networking infrastructure (e.g. the Internet) on top of standard protocols, or over a service provider's private network with a defined Service Level Agreement (SLA) between the VPN customer and the VPN service provider.