VPN Technologies
Article REF: H5610 V2

VPN Technologies

Author : Jean-Paul ARCHIER

Publication date: April 10, 2026 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

Overview

ABSTRACT

This article briefly presents the main topologies and technologies used to set up VPN (Virtual Private Network)).

After discussing the functions of a VPN, the article describes the two possibilities of exploitation (by the company or an operator) of the VPNs and then the classic topologies: Total mesh, Star, Hub and Spoke, Hybrid.

The impact of an enterprise VPN is also considered before briefly describing the main protocols: IPsec, SSL, GRE, MPLS as well as private VPN services provided by commercial companies

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

  • Jean-Paul ARCHIER: Network Trainer and Consultant - JPACONSEIL

 INTRODUCTION

It is very common for data exchanges between different locations within the same company, between companies, or between remote workers and their company to take place over the Internet. It is therefore essential that the use of this network—where communications are potentially accessible to third parties—does not compromise the security of these exchanges. In particular, there is a risk that exchanged data could be intercepted or altered. To mitigate these risks, the most common solution is to use a VPN (Virtual Private Network) between the parties involved.

A VPN also allows users to bypass the restrictions and filtering measures that may be imposed in certain countries to limit residents' access to information or their ability to send messages or documents to the rest of the world.

A VPN can therefore be established between entire networks, between a computer and a remote network, or even between two computers, using a wide variety of technologies and protocols. The choice of these technologies and protocols will depend on the objectives to be achieved, technical or regulatory constraints, as well as the skills required for their implementation or maintenance. The management of these VPNs can be handled entirely by the company or outsourced to a service provider.

In the first case, this requires in-house expertise or the use of third-party providers. The cost can therefore vary significantly. In the case of VPNs outsourced to a service provider, the significantly higher cost and the long-term commitment typically associated with these contracts make it necessary to conduct a thorough analysis before undertaking a deployment of this nature.

When it comes to personal use, the choice will depend primarily on the budget required if you opt for a subscription with a third-party provider, as well as on the features offered by the VPN, particularly its ability to bypass filters or virtually relocate by using servers located in a country other than your country of residence. The variety of protocols offered, as well as the number and location of VPN servers, will also be important criteria when choosing among the various providers available. It is also possible for an individual to set up a VPN connection to their home network while away, provided they have the necessary skills and infrastructure.

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


KEYWORDS

firewall   |   MPLS   |   VPN   |   Mesh   |   encryption   |   Virtual Private Network   |   IPsec

Ongoing reading
VPN Technologies

Article included in this offer

"Security of information systems"

( 89 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us