Virtual Private Network (VPN) : Technical-Specification

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

VIRTUAL PRIVATE

NETWORK(VPN)
Technical-Specification

Document Version: 1.0


Author: Jonnathan Alexander Narvaez Mondragon
Table of Contents
Client Details................................................................................................................................................................... 2
Purpose...........................................................................................................................................................................2
Scope of the product.......................................................................................................................................................2
Product Perspective........................................................................................................................................................2
Operating Environment...................................................................................................................................................3
Constrains.......................................................................................................................................................................3
Features.......................................................................................................................................................................... 3
Feature 1.....................................................................................................................................................................3
Feature 2.....................................................................................................................................................................3
Feature 3.....................................................................................................................................................................3
User guide....................................................................................................................................................................... 4
Proposed by:...................................................................................................................................................................4
Approved by:................................................................................................................................................................... 4

Page 1 of 10
Client Details
Company/Business Name My Adobe

Site Address Western Suburb

Contact Person Mr Johns Adams (Operation Manager)

Contact Email jadams@myadobe.com.au

Purpose
VPN is a network technology that allows one or more computers to be connected in a virtual private network,
through a public network such as the Internet, without the need for the computers to be physically connected to
each other or to be in the same place.

In this way, two or more devices can connect and exchange data in a secure and private way through a username
and password.

It is widely used by companies to allow their employees to connect from anywhere to the corporate network,
where they can access corporate resources that they could not without it.
Also to encrypt connections and thus improve security.

Scope of the product


For MyAdobe, the VPN guarantees secure access to the company's servers, and the data recorded by this tunnel is
usually end-to-end encrypted. Also, it is common for the data that is exchanged between workers' devices and the
Internet to be encrypted.
Undoubtedly one of the advantages of using a VPN in a MyAdobe is allowing workers to browse the network
anonymously. Privacy is a fundamental factor for users, but even more so when it can compromise an entire
organization.

Unlike what happens in a VPN destined for the end-user, in the business the servers can verify the authenticity of
the users who use it and for this purpose in many cases, the workers are provided with a token that allows them
to confirm their identity and therefore use this private network.

Product Perspective
We can say that the history of the VPN is so long even from the moment the Internet was invented. Since it was
widely and is widely used to connect at least two fixed access points between two servers or PCs, safely through
an encrypted tunnel and that it is as secure as possible.
In the beginning, they were used to connect two access points and that they have sufficient security standards so
that no cybercriminal can violate the connection and access the data that was passing through that connection.
Of course, through time they progressed, they were having other types of more commercial uses where access to
the VPN through a public network has become overcrowded with the option of having other purposes more than
a personal user.
In effect, it is about the internet within the internet, private, secure and encrypted from prying eyes, malware,
hackers and anyone else who wants to know where we are browsing, or from where we are browsing.

Page 2 of 10
Operating Environment
How Does a VPN Work?
Simply put, the moment you run a VPN client and initiate a connection to a VPN server, the client will start
encrypting all the traffic you send to the server. Once the client establishes a connection to the server, your IP
address is replaced with the server’s address.

Afterwards, the server decrypts all the data it receives from you, and forwards your connection requests to the
website you want to access. After the server receives the requested data (like a web page), it encrypts it, and
forwards it to the client. When the VPN client on your device finally receives the traffic, it decrypts it for you.

What Is a VPN Server?


A VPN server is a physical or virtual device that VPN providers use to deliver their services to users. They manage
to do that by installing VPN software on the server. Some providers have their own physical servers, but most of
them rent high-security servers from reliable data centers. Physical VPN servers are a bit more popular than
virtual ones, but they’re equally secure as long as they are configured properly.
What Is a VPN Client?
A VPN client is software that you install on your device, and use to initiate connections to a VPN server. They are
responsible for encrypting the traffic you send to the server, and decrypting all the data you receive from the
server. Most VPN clients also have added functionality – like allowing you to switch between VPN protocols,
choose different ports, and turn additional features (like a  Kill Switch) on or off.
It’s important to differentiate between built-in VPN clients and third-party clients. The former are native software
that come pre-configured on your operating system (like the Windows 10 VPN client). The latter are applications
you get from third-party VPN providers.

Constrains
A VPN can slow down your company's internet speed because the Internet connection with a VPN is redirected
and encrypted through the VPN server, your Internet connection may slow down a bit. Therefore, it is important
to check the speed of a VPN when you are testing it. You can find a great section on speed in all our reviews.

An unwarranted sense of impunity when connecting, some believe that their VPN connection makes them
completely anonymous and that they are not affected by malware. This leads to the false belief that they are
untouchable on the Internet. This is not the case.

Even with a strong and stable VPN connection, you can still:
 Get followed all over the web by advertisers, trackers, hackers, intelligence agencies, etc.
 Being a target and a victim of phishing attacks
 Get infected with some kind of malware

Page 3 of 10
Features

Feature 1
Feature End-to-End Encryption

Descriptio Your device (computer, smartphone, tablet, etc.) initiates a connection to a VPN server. After the
n device is authenticated, an encrypted tunnel is created.

Any information that is sent over the Internet must be divided into packages. Hence, your private
data is split, encapsulated and passed through the encrypted VPN tunnel.

Purpose VPN encryption encrypts your online data so that third parties cannot view or misuse it.

Feature 2
Feature Unlimited devices in the same time

Descriptio Each device would have its login and password


n

Purpose MyAdobe can use an unlimited number of devices simultaneously.

Feature 3
Feature Block malicious websites and advertising

Descriptio Blocks pages known to host malware or phishing scams, while keeping you safe from potential
n threats.

Purpose It takes care of pop-up ads from web pages, so your browsing experience will be much faster.

User guide
Follow these simple steps to set up the VPN:

1.Easily download hide.me VPN


https://hide.me/en/vpnsetup/windows10/

2.Choose a Protocol

Page 4 of 10
3. Press Windows key + r and type "powershell" to open the Windows PowerShell.

4. Run the following command to configure the VPN connection. You can replace free-nl.hide.me with your the
server list of your choice.

Add-VpnConnection -Name "hide.me IKEv2" -ServerAddress "free-nl.hide.me" -TunnelType "Ikev2"


-RememberCredential

5. Open the settings and then click on "Network & Internet".

Page 5 of 10
6. Click on "Connect".

Page 6 of 10
9. Enter your login credentials and click on "OK".

10. If connection has been successfully established, it displays "Connected". You can manage your VPN connection
in the settings.

Page 7 of 10
Proposed by:
Name: Jonnathan Alexander Narvaez Mondragon

Signature Jonathan Narvaez


:

Date: 25/04/2021

Approved by:
Name: Johns Adams

Signature Johns Adams


:

Contact: jadams@myadobe.com.au

Date: 25/04/201

Page 8 of 10

You might also like