Internet Windows Android

What is a VPN, what is it for and how to use it? VPN connection - what it is, why you need it and how it works.

Imagine a scene from an action movie in which a villain escapes from a crime scene on a highway in a sports car. A police helicopter pursues him. The car enters a tunnel with several exits. The helicopter pilot does not know from which exit the car will appear, and the villain escapes from the pursuit.

VPN is a tunnel that connects many roads. No one outside knows where the cars entering it will end up. No one outside knows what is happening in the tunnel.

You've probably heard of VPN more than once. On Lifehacker about this thing too. VPNs are most often recommended because the network can be used to access geo-blocked content and generally improve Internet security. The truth is that going online through a VPN can be just as dangerous as going directly.

How does a VPN work?

Most likely you have a Wi-Fi router at home. Devices connected to it can exchange data even without the Internet. It turns out that you have your own private network, but in order to connect to it, you need to be physically within range of the router signal.

VPN (Virtual Private Network) is a virtual private network. It works over the Internet, so you can connect to it from anywhere.

For example, the company you work for might use a VPN for telecommuters. WITH using a VPN they connect to working network... At the same time, their computers, smartphones or tablets are virtually transferred to the office and connected to the network from the inside. To enter a virtual private network, you need to know the VPN server address, username and password.

Using a VPN is pretty straightforward. Usually a company sets up a VPN server somewhere on local computer, a server or in a data center, and the connection to it occurs using a VPN client on the user's device.

Built-in VPN clients are now available on all current operating systems, including Android, iOS, Windows, macOS, and Linux.

VPN connection between client and server is usually encrypted.

So VPN is good?

Yes, if you are a business owner and want to secure your corporate data and services. Letting employees enter the work environment only through VPN and software accounts, you will always know who and what did and is doing.

Moreover, the VPN owner can monitor and control generally all traffic that goes between the server and the user.

Do employees sit on VKontakte a lot? You can close access to this service. Gennady Andreevich spends half his day on sites with memes? All his activity is automatically recorded in the logs and will become an iron argument for dismissal.

Why VPN then?

VPN allows you to bypass geographic and legal restrictions.

For example, you are in Russia and you want. With regret, you learn that this service is not available from the Russian Federation. You can only use it by going online through the VPN server of the country in which Spotify operates.

In some countries, there is Internet censorship that restricts access to certain sites. You want to go to some resource, but it is blocked in Russia. You can open a site only by going online through the VPN server of a country in which it is not blocked, that is, from almost any other than the Russian Federation.

VPN is a useful and necessary technology that copes well with a certain range of tasks. But the security of personal data still depends on the VPN service provider's integrity, common sense, attentiveness, and Internet literacy.

Previously, the state had a rather mediocre understanding of the Internet, so it did not legally interfere with users. Today, walking on the world wide web, more and more often you can come across the phrase: "This site is included in the register of prohibited ones" or "Your provider has blocked access."

So, if you want to return complete freedom of action on the Internet and acquire another level of protection, then you certainly need to familiarize yourself with the technology of virtual private networks - VPN.

VPN: term and principle of operation

Virtual Private Network (VPN) is the name of a technology that provides the creation and overlay of one or more networks on top of any other user network.

Now, how exactly does VPN work. Your computer has a specific IP address that blocks access to specific sites. You enable VPN technology through a program or extension. VPN changes your address to an address from a server in another country (for example, Holland or Germany).

Next, a secure connection is created, which cannot be blocked by the provider. As a result, you get a secure protocol by which you can freely visit any Internet site, and completely anonymously.

Structure and varieties of technology

The whole technology works in two layers. The first is the internal network, the second is the external. When you connect to the technology, the system identifies your network, and after that it will send an authentication request. This technology very similar to authorization in some social network, only here everything is carried out through secure protocols and without the participation of a provider.

Sami virtual networks also fall into several categories. The main classification is according to the degree of protection, that is, the user can use both paid VPNs and free ones.

The difference between the two is the secure connection. For example, subscription systems will give you secure protocols like PPTP, IPSec, and others. While free VPNs often provide only "trusted" channels. That is, your network itself should be highly secure, and a VPN will only increase the level of protection.

To be honest, the biggest disadvantage of free VPN services is not even security, but stability and connection speed. Across free VPN the internet will most likely be very slow and not always stable.

The subscription to paid VPN does not exceed $ 10 per month, but not every user needs it. For ordinary tasks, there is no point in purchasing Premium accounts, the standard features are quite enough.

Reasons to use a VPN

Every user needs to use VPN technology, and here's why:

  • Data protection. Especially suitable for those users who like to connect to a "free" neighbor's Wi-Fi connection, and then find that their card data has been stolen. Such situations include gatherings in cafes and, in general, in any points with free Wi-Fi.
  • Complete anonymity. When you open new tab with the site - this action will be displayed on the provider's server, so that your journey on the Internet can be tracked by any employee of the company. By turning on the VPN, you will hide your browsing or visit history because you are using a different IP address.
  • The ability to surf the Internet without obstacles. Bookmakers, online casinos, torrents, forums, sites for adults - all the "underground" of the Internet is again available to you, everything is like in the old days.
  • Using foreign resources. It is, of course, unlikely that you will use English-language services, such as hulu.com, but all the same - full access to all popular sites around the world is provided to you.

How do I use a VPN on my computer?

Consider the situation when we use regular browser and want to visit blocked sites. In this situation, you can go in two ways:

  1. install the VPN client (program) on the PC;
  2. add browser extension via Webstore.

What is the first, what is the second option - they are easy to implement, but for a complete picture, we will consider both.

You can also use free,.

To install a VPN client, you need to download a program on the Internet, for example, "Betternet". Launch setup file and install the client. We launch it, click: "Connect" and that's it. The problem is that the program automatically gives us a random IP-address, and we cannot select a country, but by pressing just one button we are already using a VPN. And one more disadvantage is the need to constantly run the program, however, some clients have the opportunity simultaneous launch with OS.

The second way is to add an extension. The disadvantage here is that, more often than not, registration is required for use, plus, extensions have the properties to "fly out". But the extension is much easier to use - you click on the icon in the browser, select the country and profit. On the this moment there are thousands of similar programs, you can choose any of them, for example, "Hotspot Shield". Add the extension to the browser, go through the registration and there will be no more technical issues.

For example, this is how the ZenMate VPN extension works in a browser:

O VPN extensions for different browsers we wrote in the article:.

How do I use a VPN on mobile devices?

We will consider those devices that have popular operating systems on board, for example, iOS or Android.

Using a VPN on smartphones or tablets is also quite simple, namely through mobile applications... The problem is that some programs require root rights, and these are additional troubles, plus the ability to turn the phone into a "brick". So look for programs that don't require you to be root. On Android, for example, it's OpenVPN, and on iOS it's Cloak. Also on iPhone and iPad you can use free and tested. I use it myself sometimes, it works great.

The download technology is very simple: download the application from Play Market or AppStore, install it on your device. Next, we activate the VPN, select the profile (from where, we get the IP address), then the connection is made and that's it. Now you are surfing the Internet via VPN, and the application you are using will tell you about it.

Now you understand how the VPN technology is implemented, and now your online presence will become more secure, anonymous, and most importantly, accessible and unlimited.

VPN (Virtual Private Network) or in translation into Russian a virtual private network is a technology that allows you to combine computer devices to secure networks to provide their users with an encrypted channel and anonymous access to resources on the Internet.

In companies, VPN is used mainly to combine several branches located in different cities or even parts of the world into one local network. Employees of such companies, using VPN, can use all the resources that are in each branch as their own local, located at their side. For example, you can print a document on a printer located in another branch with just one click.

For ordinary users internet VPN useful when:

  • the site was blocked by the provider, but you need to enter;
  • often have to use online banking and payment systems and want to protect data from possible theft;
  • the service works only for Europe, and you in Russia do not mind listening to music on LastFm;
  • do not want the sites you visit to track your data;
  • there is no router, but it is possible to connect two computers to a local network to provide both access to the Internet.

How VPN works

VPNs work through a tunnel that they establish between your computer and a remote server. All data transmitted through this tunnel is encrypted.

It can be thought of as an ordinary tunnel, which is found on highways, only laid through the Internet between two points - a computer and a server. In this tunnel, data, like cars, sweeps between points at the highest possible speed. At the entrance (on the user's computer), this data is encrypted and goes in this form to the addressee (to the server), at this point they are decrypted and interpreted: the file is downloaded, a request is sent to the site, etc. After which the received data is again encrypted on server and through the tunnel are sent back to the user's computer.

For anonymous access to sites and services, a network consisting of a computer (tablet, smartphone) and a server is enough.

In general, data exchange via VPN looks like this:

  1. A tunnel is created between the user's computer and the server with installed software for VPN creation... For example OpenVPN.
  2. In these programs, a key (password) is generated on the server and on the computer to encrypt / decrypt data.
  3. The request is generated on the computer and encrypted using the key created earlier.
  4. The encrypted data is transmitted over the tunnel to the server.
  5. The data that came from the tunnel to the server is decrypted and the request is executed - sending a file, entering the site, starting the service.
  6. The server prepares the response, encrypts it before sending it, and sends it back to the user.
  7. The user's computer receives the data and decrypts it with the key that was generated earlier.

The devices included in the VPN are not geographically tied and can be located at any distance from each other.

For an ordinary user of virtual private network services, it is enough to understand that accessing the Internet through a VPN is complete anonymity and unlimited access to any resources, including those that are blocked by the provider or are inaccessible for your country.

Who needs a VPN and why

Experts recommend using a VPN to transfer any data that should not end up in the hands of third parties - logins, passwords, private and business correspondence, and work with Internet banking. This is especially true when using open access points - WiFi at airports, cafes, parks, etc.

The technology will also come in handy for those who want to freely access any sites and services, including those blocked by the provider or open only to a certain circle of people. For example, Last.fm is available for free only for residents of the United States, England and several other European countries. Using a music service from Russia will allow a VPN connection.

Differences between VPN and TOR, proxy and anonymizers

VPN works globally on the computer and redirects the work of all software installed on the computer through the tunnel. Any request - via chat, browser, client cloud storage(dropbox), etc., before reaching the destination, passes through the tunnel and is encrypted. Intermediate devices "confuse traces" through encryption of requests and decrypt it only before sending it to the final recipient. The final addressee of the request, for example, a website, does not record user data - geographic location, etc., but data VPN server a. That is, it is theoretically impossible to track which sites the user visited and what requests he sent over a secure connection.

To some extent, anonymizers, proxies and TOR can be considered analogs of VPNs, but all of them are somewhat inferior to virtual private networks.

How VPN differs from TOR

Like VPN, TOR technology assumes encryption of requests and their transfer from user to server and vice versa. Only TOR does not create permanent tunnels, the ways of receiving / transmitting data change with each access, which reduces the chances of intercepting data packets, but does not have the best effect on the speed. TOR is free technology and is supported by enthusiasts, so you shouldn't expect stable work. Simply put, you will be able to access a website blocked by your provider, but it will take several hours or even days to download HD video from it.

How VPN differs from proxy

Proxies, by analogy with VPNs, redirect the request to the site, passing it through intermediary servers. It is only easy to intercept such requests, because the exchange of information occurs without any encryption.

How VPN differs from anonymizer

Anonymizer is a stripped-down version of a proxy that can only work within an open browser tab. You will be able to enter the page through it, but you will not be able to take advantage of most of the possibilities, and no encryption is provided.

In terms of speed, the proxy will win out of the methods of indirect data exchange, since it does not provide for encryption of the communication channel. In second place is VPN, which provides not only anonymity, but also protection. The third place is for the anonymizer limited to work in an open browser window. TOR is suitable when there is no time and opportunity to connect to a VPN, but you should not count on high-speed processing of large requests. This gradation is valid for the case when unloaded servers are used, which are at the same distance from the tested one.

How to connect to the internet with a VPN

Dozens of services offer VPN access services on RuNet. Well, around the world there are probably hundreds. Basically, all services are paid. The cost ranges from a few dollars to several tens of dollars per month. Experts who have a good understanding of IT create a VPN server for themselves on their own, using servers for these purposes, which are provided by various hosting providers. The cost of such a server is usually about $ 5 per month.

Prefer paid or free solution depends on requirements and expectations. Both options will work - hide location, change ip, encrypt data during transmission, etc. - but problems with speed and access to paid services occur dramatically less frequently and are resolved much faster.

Tweet

Plus

Please enable JavaScript to view the

VPN (Virtual Private Networks) - virtual private networks. VPN is one such technology, about which it is not known where they came from. However, when such technologies take root in a company's infrastructure, everyone is surprised how they used to do without them. VPNs allow you to use the Internet as your own private network. Thus, the spread of VPN is associated with the development of the Internet. The technology itself uses the TCP / IP protocol stack as a basis for its operation.

In order to understand what a VPN is, you need to understand two concepts: encryption and virtuality.

Encryption is a reversible transformation of a message to hide it from unauthorized persons.

Virtuality is an object or state that does not really exist, but can arise under certain conditions.

Encryption converts a message from one kind, for example, "Hello!" in another form "* & 878hJf7 * & 8723". On the other hand, there is also an inverse transformation, which is called decryption, i.e. converting the message "* & 878hJf7 * & 8723" to the message "Hello!" The VPN security approach assumes that no one other than the intended recipient can perform the decryption.

The concept of "virtuality" refers to the "as if" situation. For example, a situation where you access a remote computer using a tablet. In this case, the tablet simulates the operation of a remote computer.

VPN has a precise definition:

VPN is an encrypted or encapsulated communication process that securely transfers data from one point to another; the security of this data is ensured by strong encryption technology and the transmitted data passes through an open, unsecured, routed network.

Since VPN is encrypted, the communication between nodes, data is transmitted securely and their integrity is guaranteed. Data travels through an open, unsecured, routed network, so it can have multiple paths to its final destination when transmitted over a shared line. Thus, a VPN can be thought of as the process of sending encrypted data from one point to another over the Internet.

Encapsulation is the process of placing a data packet inside an IP packet. Encapsulation allows you to add an extra layer of protection. Encapsulation allows you to create VPN tunnels and transfer data over a network with other protocols. The most common way to create VPN tunnels is to encapsulate network protocols (IP, IPX, AppleTalk, etc.) in PPP and then encapsulate the resulting packets in tunneling protocols. The latter is most often the IP protocol, although, in rare cases, ATM and Frame Relay protocols can also be used. This approach is called Layer 2 Tunneling, since the passenger is the Layer 2 Protocol (PPP) itself.

An alternative approach is packet encapsulation network protocol directly into a tunneling protocol (such as VTP) is called Layer 3 tunneling.

By purpose, VPNs are divided into three types:

  1. Intranet - used to unite several distributed branches of one organization into a single secure network, exchanging data via open channels communication.
  2. Extranet - Used for networks to which external users (such as customers or clients) connect. Due to the fact that the level of trust in such users is lower than in the company's employees, special protection is required to prevent external users from accessing especially valuable information.
  3. Remote access - created between central corporate offices and remote mobile users... With encryption software loaded on the remote laptop, the remote user establishes an encrypted tunnel with the VPN device at the corporate headquarters.

There are many options for implementing a VPN. When deciding how to implement a VPN, you need to consider the performance factors of VPN systems. For example, if a router is running at the limit of its processor power, then adding more VPN tunnels and applying encryption / decryption can cause the entire network to stop working as the router will not be able to handle normal traffic.

VPN implementation options:

  1. VPN based on firewalls. Firewall ( firewall) is a software or hardware-software element computer network, which monitors and filters network traffic passing through it in accordance with the specified rules. Most vendors' firewalls today support tunneling and data encryption. All such products are based on the fact that traffic passing through the firewall is encrypted.
  2. VPN based on routers. Since all information coming from local network, first arrives at the router, then it is advisable to assign encryption functions to it. Cisco routers, for example, support L2TP, IPSec encryption protocols. In addition to simple encryption, they also support other VPN features such as connection authentication and key exchange.
  3. VPN based network operating system... On Linux, VPN connections are usually made using technologies such as OpenVPN, OpenConnect, or NetworkManager. Windows VPN uses PPTP, which is integrated into Windows.

After setting up, click Next. Created by VPN connection can be found in the window Network connections ... There you can also create a shortcut for this connection. I mean, many have a shortcut for connecting to the Internet on the desktop. Here is the same topic. The VPN connection is connected in the same way as all other connections.

During this setup, the user does not have access to most of the VPN connection settings. Therefore, after creating a connection, you can enter VPN connection properties and change the parameters you want. But in general, these parameters should not be changed.

What is VPN Reconnect?

VPN Reconnect is new Windows function 7. And as you might guess, this function belongs to VPN technology. We have already learned what VPN is.

What is VPN Reconnect? VPN Reconnect is a feature that can initiate reconnection to the VPN server when it is disconnected. With traditional VPN connections, if the connection was lost, you had to manually reconnect the connection again. Moreover, any process that took place at this moment will have to be started from the beginning.

But times are changing. The new VPN Reconnect feature allows you to automatically re-initiate a broken connection without re-authorization. All this is possible thanks to the new IKEv2 tunneling protocol with the MOBIKE extension. And since we're talking about protocols, it's worth noting that the rest of the protocols (PPTP, L2TP / IPsec, SSTP), which are also supported in Windows 7, are not compatible with the VPN Reconnect function. And given the fact that the IKEv2 protocol is the most secure of all the protocols listed above, it follows that the use of the new IKEv2 protocol is not only safe, but also convenient.

The IKEv2 protocol with the MOBIKE extension allows you to automatically re-initiate the connection even after 8 hours of disconnection. More precisely, the maximum break time is 8 hours. You can leave the computer for a couple of hours, turn off the Internet, then come in, connect to the Internet and continue working on remote computer... Also, this protocol allows VPN clients change your Internet addresses. So, you can safely move from one place to another, while disconnecting the previous connection and connecting to a new connection to the Internet, but you will still be connected to the VPN. Although in truth, you disconnect from the VPN connection first, VPN Reconnect will return it to you immediately. So you won't notice anything.

I recently introduced readers to new technology Direct Access, which bypasses VPN technology in several ways. So, one of the advantages of DirectAccess - constant connection - can be easily compensated new function VPN. The main thing here is to keep up with fashion and use new software: I already mentioned Windows 7 (by the way, in the article Why Windows 7 is better than Windows XP, you can find other examples of XP really lagging behind the advanced OS), but about Windows Server 2008 R2 forgot. This means that IKEv2 only supports VPN servers running Windows Server 2008 R2 or later.

Well, in the end, I will indicate the place where you can configure the maximum time for disconnecting the connection. To do this, you need to go to Network connections, find the created VPN connection there and go to it Properties a. Next, on the tab Safety find and poke button Extra options ... In the opened window Additional properties go to tab IKEv2, check the box Mobility and indicate the maximum break time. This is how the VPN Reconnect function is configured.