Creating a Tunnel with VPNs

This is Two Minute Tech Tips, I’m your host Lester Steward. In this series we are discussing Business cybersecurity and what you need to know to protect your business.

Virtual private networking is a tool used for remote working, security from the greater internet, or to even hide where you might be connecting from so you can access TV shows from a different country. VPNs have become a normal part of society. If you listen to any podcasts at all you’ve more than likely heard an advertisement for VPN services.

If you are trying to connect to your business, there should be a server or firewall that handles this connection and getting with your IT partner to set one up is the best course of action because they can be difficult initially. There are several types of VPN security protocols and standards but I’m going to focus on three that I feel are the most common.

IKE version 2 is one of the more modern standards, this generally uses a configuration file that’s installed on the PC and then the user enters their credentials to connect. SSL VPN generally uses an application installed on the operating system and credentials for the user to connect. The most common VPN is called L2TP, this can be setup a few different ways but the most common is with a pre-shared key in the form of a passcode, a username and password for authentication.

VPNs create this nice private tunnel between networks. The security this provides can’t be overstated. Whether connecting to work or just for hiding your location, VPNs are your best friend.

If you need any information on this subject, please let North Tech Group know by visiting our website ntgak.com.

On the next episode I’ll be discussing more email security with a focus on filtering systems.Thanks for joining me, Lester Steward for your Two Minute Tech Tips, helping you keep safe in your cybersecurity world

Scroll to Top