Pin Me

Virtual Private Networks in Business Environments

written by: Steve Mallard•edited by: Bill Bunter•updated: 5/7/2010

Need to ensure your data is transmitted securely? Virtual Private Networks ensure your business transmits data securely. In this series, we examine how to setup VPNs on Microsoft Windows Vista, Windows XP Professional, Macintosh and Linux. Learn how to set these VPNs up with step by step

  • slide 1 of 2

    What is a Virtual Private Network?

    A Virtual Private network allows for the secure connection to a VPN or remote server. Encryption is of the utmost importance in any environment and Virtual Private Networks are the standard for ensuring this encryption takes place. VPNs are particularly important if confidential or high risk data is moved from one point to another. This series walks you through setting up a VPN in Windows Vista, Windows XP, Macintosh and Linux.

    Using ports 1723 and the protocols LT2P and PPTP, the data is tunneled to the host and secured while in transit. Although these aforesaid protocols are common the administrator should implement 128-bit IPSEC (3DES) or 256-bit AES if at all possible for the highest level of security.

    Virtual Private Networks are setup through software or can be setup with nodes on your network. A Majority of hardware firewalls have integrated VPNs that connect point to point with other firewalls to further ensure data integrity and security.

  • slide 2 of 2

    VPN Security Policies

    A Security policy for VPNs should be integrated into the information technology policies. The policy should define who uses the VPN and how the VPN is used. This documentation insures that the end user uses the VPN and that the VPN is used properly. The policy should contain what protocols, ports, firewall rules and devices are used for the VPN. End users connecting to a remote server should only be allowed a connection through a VPN.

    The policy should go on to define what security requirements should be met prior to connection. Elements such as Windows Updates, Anti-virus protection and other components must be up to date. This protection should be a part of the hosting server / computer and the remote users. For end users not meeting these requirements, they should be put on a quarantined network where their computer receives updates. Quarantining computers is a process that ensures security measures are met.

    Further authentication and security can take place if two-factor authentication is used or if third party VPN software is used.

    In the next part of this series, we will look at implementing a virtual private network in Windows Vista.

Virtual Private Networks in Business Environments

Virtual Private Networks provide encryption for your critical data while it is in transit to a server. This series gives a step by step tutorial on how to setup a VPN on Microsoft Windows Vista, Windows XP, Macintosh and Linux.
  1. Virtual Private Networks in Business Environments
  2. Virtual Private Networks in Buiness Environments: Windows Vista
  3. Virtual Private Networks in Business Environments: Windows XP
  4. Virtual Private Networks in Business Environments: Apple Mac
  5. Remote Access Service on Windows 2003 Setup Guy
  6. A Guide to VPN Setup in Ubuntu
  7. Virtual Private Networks in Business Environments - Wireless VPN Solution