【正文】
cols may not work from such public access points. VPN Quarantine The client machine at the end of a VPN could be a threat and a source of attack。s perspective, this means that while the VPN connection is active, all access outside the secure network must pass through the same firewall as if the user were physically connected to the inside of the secured network. This reduces the risk that an attacker might gain access to the secured network by attacking the VPN client39。s workstation or client and the host network or server. As the user39。. . . . . virtual private network A virtual private network (VPN) is a private munications network often used by panies or organizations, to municate confidentially over a public network. VPN traffic can be carried over a public networking infrastructure (. the Internet) on top of standard protocols, or over a service provider39。s private network with a defined Service Level Agreement (SLA) between the VPN customer and the VPN service provider. A VPN can send data . voice, data or video, or a bination of these media, across secured and encrypted private channels between two points.Authentication mechanismVirtual private networks can be a cost effective and secure way for different corporations to provide users access to the corporate network and for remote networks to municate with each other across the Internet. VPN connections are more costeffective than dedicated private lines. Generally, a firewall sits between a remote user39。s client establishes the munication with the firewall, the client may pass authentication data to an authentication service inside the perimeter. A known trusted person, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users.Many VPN client programs can be configured to require that all IP traffic must pass through the tunnel while the VPN connection is active, for increased security. From the user39。s host