Professional Documents
Culture Documents
Virtual Private Network (VPN) : Technical-Specification
Virtual Private Network (VPN) : Technical-Specification
Virtual Private Network (VPN) : Technical-Specification
NETWORK(VPN)
Technical-Specification
Page 1 of 10
Client Details
Company/Business Name My Adobe
Purpose
VPN is a network technology that allows one or more computers to be connected in a virtual private network,
through a public network such as the Internet, without the need for the computers to be physically connected to
each other or to be in the same place.
In this way, two or more devices can connect and exchange data in a secure and private way through a username
and password.
It is widely used by companies to allow their employees to connect from anywhere to the corporate network,
where they can access corporate resources that they could not without it.
Also to encrypt connections and thus improve security.
Unlike what happens in a VPN destined for the end-user, in the business the servers can verify the authenticity of
the users who use it and for this purpose in many cases, the workers are provided with a token that allows them
to confirm their identity and therefore use this private network.
Product Perspective
We can say that the history of the VPN is so long even from the moment the Internet was invented. Since it was
widely and is widely used to connect at least two fixed access points between two servers or PCs, safely through
an encrypted tunnel and that it is as secure as possible.
In the beginning, they were used to connect two access points and that they have sufficient security standards so
that no cybercriminal can violate the connection and access the data that was passing through that connection.
Of course, through time they progressed, they were having other types of more commercial uses where access to
the VPN through a public network has become overcrowded with the option of having other purposes more than
a personal user.
In effect, it is about the internet within the internet, private, secure and encrypted from prying eyes, malware,
hackers and anyone else who wants to know where we are browsing, or from where we are browsing.
Page 2 of 10
Operating Environment
How Does a VPN Work?
Simply put, the moment you run a VPN client and initiate a connection to a VPN server, the client will start
encrypting all the traffic you send to the server. Once the client establishes a connection to the server, your IP
address is replaced with the server’s address.
Afterwards, the server decrypts all the data it receives from you, and forwards your connection requests to the
website you want to access. After the server receives the requested data (like a web page), it encrypts it, and
forwards it to the client. When the VPN client on your device finally receives the traffic, it decrypts it for you.
Constrains
A VPN can slow down your company's internet speed because the Internet connection with a VPN is redirected
and encrypted through the VPN server, your Internet connection may slow down a bit. Therefore, it is important
to check the speed of a VPN when you are testing it. You can find a great section on speed in all our reviews.
An unwarranted sense of impunity when connecting, some believe that their VPN connection makes them
completely anonymous and that they are not affected by malware. This leads to the false belief that they are
untouchable on the Internet. This is not the case.
Even with a strong and stable VPN connection, you can still:
Get followed all over the web by advertisers, trackers, hackers, intelligence agencies, etc.
Being a target and a victim of phishing attacks
Get infected with some kind of malware
Page 3 of 10
Features
Feature 1
Feature End-to-End Encryption
Descriptio Your device (computer, smartphone, tablet, etc.) initiates a connection to a VPN server. After the
n device is authenticated, an encrypted tunnel is created.
Any information that is sent over the Internet must be divided into packages. Hence, your private
data is split, encapsulated and passed through the encrypted VPN tunnel.
Purpose VPN encryption encrypts your online data so that third parties cannot view or misuse it.
Feature 2
Feature Unlimited devices in the same time
Feature 3
Feature Block malicious websites and advertising
Descriptio Blocks pages known to host malware or phishing scams, while keeping you safe from potential
n threats.
Purpose It takes care of pop-up ads from web pages, so your browsing experience will be much faster.
User guide
Follow these simple steps to set up the VPN:
2.Choose a Protocol
Page 4 of 10
3. Press Windows key + r and type "powershell" to open the Windows PowerShell.
4. Run the following command to configure the VPN connection. You can replace free-nl.hide.me with your the
server list of your choice.
Page 5 of 10
6. Click on "Connect".
Page 6 of 10
9. Enter your login credentials and click on "OK".
10. If connection has been successfully established, it displays "Connected". You can manage your VPN connection
in the settings.
Page 7 of 10
Proposed by:
Name: Jonnathan Alexander Narvaez Mondragon
Date: 25/04/2021
Approved by:
Name: Johns Adams
Contact: jadams@myadobe.com.au
Date: 25/04/201
Page 8 of 10