Wednesday, April 8, 2015

VPN and SSH: Which method is more secure?

Both VPN and SSH allow network traffic transmitted over a secure connection. They have similarities but also differences.



If you are wondering how to use the technique, the article will help you understand the mode of operation of each technology. An SSH tunnel like a VPN generally "poor" (poorman VPN) protocols as well can bring some features like VPN without server setup process is too complicated. However, SSH still have some limitations.

VPN

VPN or Virtual Private Network, which is used to connect to a private network over a public network. Case is an enterprise VPN users can have a private network data sharing, network printers and other important things on it.

Some employees may travel frequently to access these resources remotely. However, businesses do not want to reveal the important resources of the company publicly on the Internet.

Instead, businesses can establish a VPN server for remote workers can connect to the VPN company. When an employee is connected to the VPN server, computer they become part of the corporate network. They can access data, and other resources like there is a direct physical connection to the network.


VPN client to connect to the VPN server over the Internet and transmit the whole of computer network traffic over a secure connection, which means that the competitors can not interfere in the connection and view the sensitive business information feeling.

Depending on the entire VPN network traffic is sent over VPN traffic or only part that can be sent (though, generally, all network traffic is set to go through VPN).

If the entire browsing traffic is transmitted via VPN, the VPN client side between the VPN server and can not interfere browsing traffic.

This gives the protection of information when using public Wi-Fi network and allows users to access geographically restricted services, such as, employees can pass internet censorship if they are working from a national web censorship.

For websites that employees access via VPN traffic, the web browser will return as the VPN client can be derived from the VPN server.

Another important thing is, VPN active at the operating system level rather than application level. In other words, when a user establishes a VPN connection, the operating system can route all network traffic through it from all applications (although this may vary from VPN to VPN, depending VPN is configured on the way). They will not be configured for each application separately.

SSH

SSH or Secure Shell not only designed to forward network traffic. Usually SSH is used to receive data safely and use a remote terminal session, but SSH also has other functions.

SSH uses encryption methods have high security and user can establish an SSH SOCKS client proxy. Then, we can configure the application on your computer such as a web browser to use the SOCKS proxy.

Incoming SOCKS proxy running on the local system and SSH client connection forwarding it via SSH. This process is called SSH Tunneling. It works similar to the process of browsing through the VPN ie, returns as Web traffic is coming from SSH server.

The traffic between your computer and the server is encrypted SSH security so that users can browse the web via a secure encrypted connection as the VPN.


However, an SSH tunnel does not bring many benefits such as a VPN connection. Unlike VPN, users must configure each application to use a proxy SSH tunnel.

With VPN, all traffic will be sent through the VPN, but this is not necessarily true for an SSH tunnel. The operating system will behave as if the user is located on the distal end of the case using VPN, meaning that the data connection sharing on Windows easily. This relatively harder with an SSH tunnel.



Technique is more secure?

If you are worried about security techniques than to apply for business, the answer is clearly VPN. You can push the entire system on the network traffic through it.

However, if you just want an encrypted connection for browsing web security from the public Wi-Fi networks in cafes, airports, both VPN and SSH ... possible because we have a method of encryption security features high density.

In another aspect, the user can easily connect to a VPN setup VPN server but is more complex. SSH on the other hand is more simple setup.

In fact, many people will have a SSH server to access them remotely. If you have access to an SSH server, setup an SSH tunnel is much simpler than setting up a VPN server.

For this reason the SSH VPN called "poor". These businesses are expected to technical stronger network will want to invest in VPN. On the other hand, SSH tunnel is an easy way to encrypt traffic for individual users can access the SSH server.

And methods of encryption it as good as in the VPN. VPN will be the perfect solution for businesses looking for a secure network engineering while SSH to suit individual users have access to the SSH server.

However, these two techniques are used encryption methods have data privacy very high.

No comments:

Post a Comment