Remote Access & VPNs
Focus: Secure connectivity and practical use of virtual networks.
Key Notes
- VPN (Virtual Private Network):
- Creates an encrypted tunnel between the user’s device and a private network.
- Masks IP address → secures data → allows access to internal systems remotely.
- Used by remote employees, IT admins, and even students connecting to school resources.
How It Works (Step-by-Step)
- You connect to the Internet.
- VPN client encrypts your data and sends it through a secure tunnel.
- VPN server decrypts the data and forwards it to the destination.
- Response data travels back through the same secure tunnel.
Why It Matters
- Protects against data interception on public Wi-Fi.
- Allows remote work from any location.
- Enables access to region-restricted or internal company servers.
Command-Level Notes (Certification Reference)
- VPN uses protocols such as IPSec, SSL, and L2TP.
- VPN concentrators manage multiple secure sessions simultaneously.
Discussion Prompts
- How would a VPN change the risk level of working from home on public Wi-Fi?
- What are the limits of VPN protection (what it can’t hide)?