You prioritize the privacy of your network, but what happens when you need to connect to the outside world? Do you let anyone and everyone in, or do you secure your network across the distance using a private or virtually private network?
Before Virtual Private Networks (VPNs), there were private networks, and they still exist. Some situations demand such high security that the only way to guarantee control and prevent intrusions is through dedicated, point-to-point private lines. For added security, encrypting the data on these lines can thwart potential eavesdroppers.
Private lines are most practical when connecting just two locations. You can lease a dedicated T1 line, meaning the connection is hardwired and remains active as long as you pay the monthly fee. This circuit carries only your traffic, with any unused capacity remaining idle.
Need more bandwidth? You can opt for DS3 private lines at 45 Mbps or fiber optic service starting at 155 Mbps. Carrier Ethernet, over copper or fiber, is another option offering more bandwidth choices and often lower costs than traditional telecom services.
While these circuits are dedicated to your locations, your data might be combined with data from others on the line. SONET fiber and Ethernet over Fiber have such high bandwidth that dedicating an entire strand or wavelength to 50 or 100 Mbps of traffic is not cost-effective.
This shared use is a form of virtual private networking. The provider divides the bandwidth using Time Division Multiplexing (TDM) time slots or virtual circuits. Since the network is private, the general public cannot access or snoop on your data.
For massive bandwidth, you can rent wavelengths on fiber circuits, typically at 5 Gbps, or rent entire dark fiber strands for almost unlimited bandwidth. These options enhance security as your traffic is isolated to the specific wavelength or fiber strand.
Another VPN method is the Multi-Protocol Label Switching (MPLS) network. Operating on private networks, MPLS carries IP traffic and other protocols but doesn’t use IP labels for routing. Instead, MPLS switches attach specific tags to each packet entering the network, removing them upon exit. This tag-based system is what makes it a virtual private network; you share the network, but the MPLS technology safeguards your data’s privacy within the network. This service is known as MPLS VPN.
VPN’s most common use is for secure connections over the internet, either point-to-point or for public access. Businesses operating online often have no choice but to use a VPN. They allow employees working remotely or traveling to connect securely to business systems without the cost of private lines. The challenge lies in transforming the inherently risky internet into a trustworthy channel for sensitive data.
The solution is “tunneling,” which creates private channels through a public network. Each data packet is encrypted, making it incomprehensible to anyone except the intended recipients. Two software methods are commonly used to achieve this.
The older method, IPsec (Internet Protocol security), requires dedicated software on both the company server and client computer. IPsec handles the encryption and decryption and must be specifically configured to create the virtual private tunnel. Once set up, you have a VPN connection from any computer with the software installed. Computers without the software can’t access the VPN.
A newer method, Secure Socket Layer (SSL), is what you use for online banking and secure email. It’s now standard in web browsers and many email programs. SSL requires a user ID and password for remote account access. You can securely access your account from almost any computer, private or public, thanks to SSL encryption.
Do you require a business-grade private or virtually private network connection? Explore the available options and determine what suits your needs best.