Linksys WRVS4400N manual Planning Your Virtual Private Network VPN, Why do I need a VPN?

Models: WRVS4400N

1 134
Download 134 pages 37.56 Kb
Page 17
Image 17

Wireless-N Gigabit Security Router with VPN

Chapter 3: Planning Your Virtual Private Network (VPN)

Why do I need a VPN?

Computer networking provides a flexibility not available when using an archaic, paper-based system. With this flexibility, however, comes an increased risk in security. This is why firewalls were first introduced. Firewalls help to protect data inside of a local network. But what do you do once information is sent outside of your local network, when e-mails are sent to their destination, or when you have to connect to your company's network when you are out on the road? How is your data protected?

That is when a VPN can help. VPNs are called Virtual Private Networks because they secure data moving outside of your network as if it were still within that network.

When data is sent out across the Internet from your computer, it is always open to attacks. You may already have a firewall, which will help protect data moving around or held within your network from being corrupted or intercepted by entities outside of your network, but once data moves outside of your network—when you send data to someone via e-mail or communicate with an individual over the Internet—the firewall will no longer protect that data.

At this point, your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data. Some of the most common methods are as follows:

1) MAC Address Spoofing

Packets transmitted over a network, either your local network or the Internet, are preceded by a packet header. These packet headers contain both the source and destination information for that packet to transmit efficiently. A hacker can use this information to spoof (or fake) a MAC address allowed on the network. With this spoofed MAC address, the hacker can also intercept information meant for another user.

2) Data Sniffing

Data “sniffing” is a method used by hackers to obtain network data as it travels through unsecured networks, such as the Internet. Tools for just this kind of activity, such as protocol analyzers and network diagnostic tools, are often built into operating systems and allow the data to be viewed in clear text.

3) Man in the middle attacks

Once the hacker has either sniffed or spoofed enough information, he can now perform a “man in the middle” attack. This attack is performed, when data is being transmitted from one network to another, by rerouting the

vpn (virtual private network): a security measure to protect data as it leaves one network and goes to another over the Internet

packet: a unit of data sent over a network

Chapter 3: Planning Your Virtual Private Network (VPN)

9

Why do I need a VPN?

Page 17
Image 17
Linksys WRVS4400N manual Planning Your Virtual Private Network VPN, Why do I need a VPN?

WRVS4400N specifications

The Linksys WRVS4400N is a versatile and powerful wireless router designed to cater to the needs of both small businesses and home users. Combining advanced security features with high-speed networking capabilities, this device stands out in a crowded market.

One of the key features of the WRVS4400N is its support for simultaneous dual-band wireless networking. It operates on both the 2.4 GHz and 5 GHz frequency bands, allowing users to enjoy faster data transfer rates while minimizing interference from other devices. The router supports the 802.11n wireless standard, which can deliver speeds of up to 300 Mbps, ensuring smooth streaming, gaming, and internet usage without disruptions.

Security is a top priority for the WRVS4400N, as it comes equipped with robust firewall protection and the latest encryption technologies. It supports both WPA and WPA2 wireless security protocols, providing users with peace of mind knowing that their data is safeguarded against potential threats. Additionally, the router features a built-in VPN that allows secure remote access to the network, making it ideal for businesses with employees who work from home or on the go.

Another notable characteristic is its four Gigabit Ethernet ports for wired connections. These ports enable users to connect devices directly to the router, benefiting from high-speed, stable connections ideal for bandwidth-heavy tasks. The WRVS4400N also includes a USB port that allows for the easily connected sharing of printers and storage devices across the network.

The router's user interface is user-friendly, making setup and configuration straightforward even for those who are not tech-savvy. Linksys also offers firmware updates to ensure the router remains secure and performs optimally over time.

In summary, the Linksys WRVS4400N is a feature-rich wireless router that combines performance, security, and versatility. With its dual-band capabilities, robust security protocols, and wired connectivity options, it is an appropriate choice for users looking to enhance their home or small business networks.