May 17, 2024

An overview of VPN Concentrators - CompTIA Network+ N10-005: 4.1



Published June 10, 2023, 8:20 p.m. by Violet Harris


See our entire video index at http://www.FreeNetworkPlus.com

If you travel outside of your corporate LAN, then you're probably using a vpn concentrator to protect your remote communications. In this video, you'll learn about vpn technology and how organizations use vpn concentrators to secure their remote users.

You may also like to read about:



VPN stands for virtual private network

and it refers to a method of creating a

private or encrypted communications path

between two devices even if those two

devices may be going over the public

Internet which anyone could have access

to anywhere in between the data path the

Virtual Private Network is a

communications path that set up where

all of the data is encrypted even if

somebody was to tap into that connection

all they would see was garbage they

would have no idea what type of

information is going back and forth

between those two devices this is often

accomplished by using something called a

VPN concentrator this is a piece of

hardware and it's designed to do a lot

of the encrypting and decrypting of

getting that information on and off of

the public network encrypting traffic

and decrypting traffic is a very CPU

intense type of application it's

something that uses a lot of CPU cycles

it's something that is very very

difficult to do over a very large scale

so it makes sense to use specialized

Hardware in very large environments you

would use something like a VPN

concentrator sometimes your environment

is relatively small and you can load up

specialized software that simply use the

built-in hardware that's in our

computers you might put your VPN

concentrator software onto a centralized

server for instance and if you're in an

environment that does not have a lot of

users having a software-based VPN

concentrator may work for you to use the

VPN concentrator you're going to need

some type of software some client

software on the workstation or on the

two devices that we'll be communicating

with each other

this software is something that may come

with the concentrator it may be a third

party piece of software that you have to

install or your operating system itself

may have the software built into it to

allow communications to that VPN

concentrator it simply depends on the

method that you're using to communicate

and the type of concentrator that you're

using from the end users perspective

using a VPN concentrator is pretty

simple you might be out at a coffee shop

and then you realize you need access to

a file that's inside of your network

back at

corporate and it's something that you

don't have access to when you're out in

public it's also very sensitive data so

you don't want anybody seeing that

information you would start the VPN

software on your workstation and it

creates what we call an encrypted tunnel

back to the VPN concentrator all of the

communication going back and forth

between those two connections is

completely encrypted the VPN

concentrator takes that information

decrypts it and then passes it off into

the internal network everything on the

internal network is obviously not

encrypted because that's your local

network there's no need to encrypt

within your building and this is the

process that takes place as the non

encrypted in the clear data is sent out

to the concentrator the concentrator

then encrypts it and sends it across the

public Internet to your local computer

and the local computer client software

will decrypt that information and

present it to you on the screen or save

the file to your hard drive when you're

finished with the connection you turn

off your client software it severs the

connection to that concentrator and now

you're using the network normally again

if you have a lot of mobile devices you

have a laptop you're traveling

constantly and you'll find that using a

VPN connection with a VPN concentrator

is going to ensure that all of your

communication is absolutely secure

Resources:

Similar videos

2CUTURL

Created in 2013, 2CUTURL has been on the forefront of entertainment and breaking news. Our editorial staff delivers high quality articles, video, documentary and live along with multi-platform content.

© 2CUTURL. All Rights Reserved.