tagline

VPN and Firewall

A Virtual Private Network (VPN) is designed to extend a private network over a public one. It allows a network-enabled device, such as a computer or tablet to send and receive data across a public network as though it were directly connected to that network.

VPN tunnel

Benefits of a VPN

There are a number of advantages of a VPN. These include:

  • Cutting your budget: A VPN can save you money by eradicating the need for long distance lines and phone service.
  • Scalability: Because a VPN taps directly into the public lines, it provides a better service and greater scalability than a dedicated private network because the cost will not increase exponentially as your enterprise grows.
  • Ease of use: When a VPN is set up correctly each client who has the appropriate networking and hardware support can use it as needed. VPN is also compatible with Wi-Fi local area networking.

VPN and Firewalls

A firewall is a network security system that is designed to block viruses, worms and hackers from invading via the Internet. When you are creating a VPN, you have two options for  your server placement:

VPN in front of the firewall: In this case the firewall is between the VPN server and the Internet. This configuration is used in perimeter networking, where there is also a firewall between the VPN server and the intranet.

VPN behind the firewall: In this case the VPN server is between the firewall and the Internet.

Types of Filtering

When you are configuring your VPN, you can opt for one of two types of filtering or a combination of both.

Packet Filtering: A firewall with packet filtering monitors traffic at the network layer. It then chooses to accept it or reject it based on the source and the destination address. It can also block traffic using a particular TCP or UDP port. The advantage of this type of filter is that it is simple and speedy and very transparent.

Application Layer Filtering: This type of filtering has a wider scope than packet filtering. It can examine message headers or content and detect abnormal data. It can also be programmed to search for specific words and/or phrases and block traffic based on that information. The advantage of this is that you can use application layer filtering to eliminate Internet attacks and stop internal users from sending sensitive data outside the internal network.

At Warrington Network Consultants we are dedicated to providing the most individual reliable and cost-effective Information Technology and Telephony solutions to suit your company’s needs. We specialize in providing complete information technology solutions for small and medium-sized businesses so you don’t have to worry about finding multiple vendors or providers. For the best in hardware security solutions, WNC recommends, installs, and maintains Cisco Security Appliances, such as the Cisco ASA devices, to be sure that your network is covered by Intrusion Detection and Stateful Packet Inspection; two key items required under most compliance laws (ie. HIPAA/HITECH, PCI DSS, FERMA, etc). Contact us today to find out more about VPN and Firewalls.

Call us today to see how easy it is to allow and protect access to your network resources! 770.578.5159

HIPAA Compliance Consulting Company News Contact Us Southern Web Group