disadvantage and of using VPN.

Posted on 2009-04-27
Last Modified: 2012-05-06
My admin suggested using VPN instead of SSH.  
My network is the client and the Admin is the Server.
Will the VPN login be seen as a login so I'll know they are logged in?
I feel the VPN is loosing control.  
I'm not sure about.  

Any feedback
Question by:T_Myles
    LVL 76

    Accepted Solution

    Are you using SSH as a tunnel?
    A VPN will not by default grant access to resources that require authentication.
    Lets say currently you have your server exposed to the Internet and you use ssh to establish connections.

    Do you have LAN <=> Internet <=> Server LAN

    Depending on the VPN, you may have granular control i.e. each connection has their own VPN or you have a site to site VPN and then whatever credentials are needed to access resources will need to be provided by the user which will generate login/logout.

    A VPN will merely link your network and the server as though you were on a the same local network and the traffic between you will be encrypted.

    The disadvantage can only be detemined if a full picture of the environment can be provided.

    I.e. if you allow VPN connections from many users, the network is exposed if one of those users has a virus infected system.  This can be handled through VPn setup that limits the type of access allowed through the VPN connection.  

    Author Comment

    I believe its a SSH tunnel!
    The objective is to eliminate the man in the middle so the admin can do the work from their computer

    Author Comment

    another point, only one person will tunnel.  How do I know that the machine that talking to my machine is logged on..  Its not just the individual its the server to client (me)connection.  

    Author Comment

    LVL 76

    Expert Comment

    I am not sure what you expect from the flurry of posts.
    If you still need help, please explain what you mean.

    Featured Post

    Free Trending Threat Insights Every Day

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Join & Write a Comment

    For a while, I have wanted to connect my HTC Incredible to my corporate network to take advantage of the phone's powerful capabilities. I searched online and came up with varied answers from "it won't work" to super complicated statements that I did…
    This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now