0% found this document useful (0 votes)
23 views3 pages

What Is a VPN - Virtual Private Network - Cisco

Uploaded by

rastechethiopia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

What Is a VPN - Virtual Private Network - Cisco

Uploaded by

rastechethiopia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Security /

What Is a VPN? - Virtual Private Network

A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The
encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from
eavesdropping on the trac and allows the user to conduct work remotely. VPN technology is widely used in
corporate environments.

Watch VPN and Duo's MFA (1:52)

VPN Solution

How a VPN Works Types of VPNs

Secure your remote workforce, fast

If you're looking to increase protection for your remote employees so they can work from any device, at any time,
from any location, get started with the Cisco Secure Remote Worker solution.

See oers

By continuing to use our website, you acknowledge the use of cookies. Privacy
Statement | Change Settings
Trials Demos Webinars
How does a virtual private network (VPN) work?
A VPN extends a corporate network through encrypted connections made over the Internet. Because the trac is
encrypted between the device and the network, trac remains private as it travels. An employee can work outside
the oce and still securely connect to the corporate network. Even smartphones and tablets can connect through a
VPN.

What is secure remote access?


Secure remote access provides a safe, secure way to connect users and devices remotely to a corporate network. It
includes VPN technology that uses strong ways to authenticate the user or device. VPN technology is available to
check whether a device meets certain requirements, also called a device’s posture, before it is allowed to connect
remotely.

Is VPN trac encrypted?


Yes, trac on the virtual network is sent securely by establishing an encrypted connection across the Internet known
as a tunnel. VPN trac from a device such as a computer, tablet, or smartphone is encrypted as it travels through
this tunnel. Osite employees can then use the virtual network to access the corporate network.

Types of VPNs

Remote access

A remote access VPN securely connects a device outside the corporate oce. These devices are known as
endpoints and may be laptops, tablets, or smartphones. Advances in VPN technology have allowed security checks
to be conducted on endpoints to make sure they meet a certain posture before connecting. Think of remote access
as computer to network.

AnyConnect VPN Meraki Auto VPN Duo Security (Multi-Factor Authentication)

Site-to-site

A site-to-site VPN connects the corporate oce to branch oces over the Internet. Site-to-site VPNs are used
when distance makes it impractical to have direct network connections between these oces. Dedicated equipment
is used to establish and maintain a connection. Think of site-to-site access as network to network.

Connecting your branch oces

Get started

Connect with us

Related network
By continuing to use security topics
our website, you acknowledge the use of cookies. Privacy
Statement | Change Settings
How Does a VPN Work? Trials Demos Webinars
How to Set Up a VPN
What Is Two-Factor Authentication?
What Is Email Security?
What is Endpoint Security?
What is Endpoint Protection?

Follow Cisco Security

Twitter Facebook Instagram

NEWS & EVENTS

About Us

Contact Us

Work with Us

Cisco Sites

Contacts

Feedback

Help

Site Map

Terms & Conditions

Privacy

Cookies

Trademarks

By continuing to use our website, you acknowledge the use of cookies. Privacy
Statement | Change Settings
Trials Demos Webinars

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy