ez-pc install and configure a range of VPN solutions and can provide a solution that fits your requirements and your budget.

Contact us for details.

NetworkingWord smallVirtual Private Networks (VPNs) allow businesses to securely extend their local area networks (LANs) over the internet. Encryption is used to keep data traffic private from unauthorised users as it passes through the internet and tunnel endpoints are authenticated before the secure VPN tunnel is established.

User-created remote-access VPNs generally implement user names and passwords whereas network-to-network tunnels often use pre-shared keys or digital certificates which are permanently stored within the routers at each end and allows the tunnel to establish automatically, without intervention from the user.

VPNs create the ideal network infrastructure for exchanging of data and using network resources with employees, partners, suppliers and customers alike.

Because the vpn tunnel is created using the internet instead of a private point to point leased line, costs are kept comparatively low, allowing more and more businesses to utilise this type of connection.

Transitory user-created remote-access VPN connections

These are used when you or your employees are in remote locations and need to connect to the business's private network. This type of access is useful for workers working at home or at other locations such as a customer's place of business or any other location with internet access. The users that will access the network remotely are provided with the software they need and the relevant access information. The connection is made on demand by the user and is broken when the user closes the connection, logs off the PC, the PC is shut down or after a preconfigured period of time. Once the connection to the office is made, the user can work from the remote location accessing resources from the office as if the computer were directly connected the LAN at the office.

Permanent office to office VPN connections

This type of network link is used when there are two or more locations that are permanently used as offices and resources or data needs to be available at all locations. The connections are configured and created on network routers at each location and no user actions are needed.

This site uses cookies. By accessing and using this website, you are agreeing to the terms of our cookie and privacy policy.