Talk:Virtual private network

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computing / Networking / Security (Rated C-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force.
Taskforce icon
This article is supported by WikiProject Computer Security (marked as High-importance).
 
WikiProject Cryptography / Computer science  (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the quality scale.
 Mid  This article has been rated as Mid-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (marked as Mid-importance).
 

security mechanisms -- TLS[edit]

"An SSL VPN can wht the hell locations that restrict external access to SSL-based e-commerce websites without IPsec implementations." This sentence does not make sense. What I believe it is trying to say is that IPsec is frequently blocked at public locations such as hotels and Starbucks, whereas SSL VPNs can connect. (IPsec also has issues with NAT traversal, but it's too soon to got into that. I am not actually sure we should even be doing pros and cons here)

I am going to change it so that it reflects my understand, because I do know for a fact that the above statement is true, but someone should review the change in case some other meaning was intended.--Elinruby (talk) 17:49, 2 May 2010 (UTC)

May I offer a suggestion about this article -- Under History, referring to the bullet:

"The tunnel's termination point, i.e., customer edge or network provider edge"

I recommend a hyperlink defining the terms "customer edge" and "network provider edge" and possibly "tunnel" and "tunner termination point." I have an interest in this article, but I'm not a technology person, so defining the above type of jargon would be very helpful. Thanks, Chris Chris Langello 14:18, 30 August 2010 (UTC) —Preceding unsigned comment added by Langello (talkcontribs)


The whole security section seems to read as if all VPNs include encryption, could use some clarification, but I dont know how to put that in without cutting content that is useful. — Preceding unsigned comment added by 193.62.88.221 (talk) 11:58, 9 October 2012 (UTC)

Is any connection using a tunneling protocol a VPN? Or does it require that you either have a fixed line or you use encryption? I have heard that the former would be correct, even though VPN is often used in a more narrow sense covering only the latter solutions. This should also be said in the article. --Parodi (talk) 14:33, 23 October 2012 (UTC)

With respect to the comments concerning simplifying this article: Unfortunately VPN's are one of the "geekiest" subjects which the general business computer user encounters. I am somewhat knowledgeable about VPN's and have successfully implemented the IPsec flavor numerous times. But I would place a sizeable bet against myself on the probability that I could get an SSH or other VPN protocol up and running in less than a day of beating my head against the nearest wall. — Preceding comment added by Lahhtims (talkcontribs) 11:42, 19 September 2013 (UTC)

This article is garbage[edit]

"Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts"

Nobody says that. You don't "block" intercepting. They can still intercept the traffic, they just might not be able to decrypt it.

"Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic" And so can TCP, IP, UDP, ARP, ... what's your point? TLS is not a VPN.

"Datagram Transport Layer Security (DTLS), is used in Cisco's next-generation VPN product" Wtf is this shit? Cisco advertisement? How can something be technically defined as "next-gen", especially when it's a simple VPN protocol?

On the tag "This article has multiple issues"[edit]

It is said: "It may be confusing or unclear for some readers". That's euphemism; as an IT guy myself, I would say the article is totally undecipherable and thus USELESS to 99.99999999999999999999999999999999% of the population on the face of this planet, and by the way, of any other planet known and unknown to mankind as of this day, and for the rest of the foreseen and unforeseen days to come, in the 2, 3, 4 and more dimensions. Get your act together guys! AlainR345Techno-Wiki-Geek 05:51, 20 February 2011 (UTC)

here's an idea for you: if you don't like the article or you don't find it to be useful, then stop wasting your time writing hyperbole and instead devote that time to editing/improving the article. —Preceding unsigned comment added by 125.211.23.41 (talk) 04:38, 18 March 2011 (UTC)
I agree. Unfortunately, I have no idea what VPN is, and came here to find out. I still don't know. In particular, I still want to know why I can't ping a remote server foo.remotehost.com (even by its IP) without VPN, but I can when I authenticate to remotehost.com with VPN. And foo.remoteserver.com has a unique IP, not some 192.168.* thing. (I guess that doesn't matter, though, does it?) Is it some DNS thing? Is it some gateway thing? Is it magic pixie dust? I read (or tried to read) the entire VPN wikipedia article, and I still don't know. 99.179.101.162 (talk) 23:46, 9 April 2011 (UTC)
I don't understand it either - can someone create the Simple English version so that the general population can make sense of the topic. — Preceding unsigned comment added by 94.195.193.37 (talk) 13:41, 6 June 2011 (UTC)
Part of the problem is that the term VPN is misused. Almost always when you hear someone saying they "want a VPN" what they actually mean is that they want to use a proxy of some kind so they can hide their real IP or appear to have an IP in another country in order to use a service that's only available in that country. There may be a VPN involved with such a proxy service in that the traffic between the user and the proxy may be encrypted but the correct use of VPN is nothing to do with proxies and is just to do with sending private traffic over a public network using encryption and other techniques to make sure it remains totally private even if it is intercepted or spoofed. Naturally this article makes little sense if you are expecting an explanation of IP changing/obscuring services. BrianDGregory (talk) 12:47, 3 July 2011 (UTC)


In basic talk... VPN is a way to access files remotely. Lets say on your computer at home you have a file you want to retrieve, VPN will allow you to see all files on your network at home using high security methods so that no one else will be able to retrieve the files your looking at or using. think of it as "tricking" the network into thinking your right there at the computer on the network looking at the files. Now the word "Tricking" is used VERY LOOSELY because the network does know your VPN, thats just the best way I can explain it to someone who is not accustomed to I.T. Anyone can set up VPN, with the right equipment, most older modems/ routers do not support VPN access. but with a few changes in your Network settings and some reading, it is possible for anyone to do it. DeepEmissions (talk) 17:48, 10 September 2011 (UTC)

"In basic talk... VPN is a way to access files remotely." That is a horrible way to describe VPN. It has nothing to do with accessing of *files*, it has to do with accessing of *hosts*. 72.177.55.101 (talk) 06:20, 19 September 2011 (UTC)

I too came to this page to understand VPN and find it wanting. In particular, I need to know if VPN is a file transfer protocol only or if it "contains" functionality to rendor the graphics. I too want to know how it is different than ftp. Is it just the kind of security? Leeteleetlink (talk) 23:51, 9 December 2011 (UTC)

Instead of worrying about the whole article, let's focus on the lead section first. I'm a software developer and I agree that reading the article lead gives 99% of the population no idea of what a VPN is or why it's notable. —Mu Mind (talk) 06:17, 3 August 2012 (UTC)

I reworked the lead section a bit to make it less wordy and use a little more plain, understandable verbiage. I also moved some very specific details out of the lead and down into other specific sections. It's not perfect, but I'd say now the article would benefit most from massaging the main sections and adding some basic context in each one before drilling down into the details. Also, the History section could be expanded to have referenced, interesting information like when the first VPN's appeared, where the term originated, or stats about the growth of VPN usage. —Mu Mind (talk) 07:38, 3 August 2012 (UTC)

fixed incomplete edit (?)[edit]

I removed the following text from the end of the History section:

VPN technology used in 1990. VPN stands for virtual private network. There are two protocols in use in VPN:

Transparent mode
used in remote technology
Tunnel mode
used in local network

I believe it's left over from someone's revision. Elinruby (talk) 22:38, 28 September 2011 (UTC)

Create a VPN server[edit]

Please comment on this telling me how to make one :)

In light of the NSA revelations[edit]

Shouldnt a section be created with the concept that VPN networks arent as secure as perceived? — Preceding unsigned comment added by 200.26.180.203 (talk) 06:44, 9 September 2013 (UTC)