Conceptly
← All Concepts
πŸ”

VPN

InfrastructureAn encrypted private network tunnel over the internet

A VPN (Virtual Private Network) creates an encrypted virtual tunnel over the public internet, connecting users or networks as if they were on a private link. It's used for remote workers accessing internal systems, linking branch offices, and connecting on-premises to cloud.

β–ΆArchitecture Diagram

πŸ” Structure

Dashed line animations indicate the flow direction of data or requests

Why do you need it?

Remote employees, branch offices, and hybrid infrastructure all need access to internal resources without turning those resources into openly reachable internet services. Simply opening ports to the public internet creates too much risk, while blocking everything makes legitimate work impossible. The challenge is to build a path across an untrusted network that behaves enough like a trusted private link to be useful. That path has to protect traffic in transit and make sure only authorized users or networks can enter it. VPN addresses this by creating an encrypted tunnel over public infrastructure rather than requiring a physically private path.

Why did this approach emerge?

When systems primarily lived inside office buildings, physical location functioned as a meaningful security boundary. As remote work, cloud adoption, and distributed teams became normal, that assumption weakened. Organizations still needed private-style connectivity, but now across public networks. VPN became the practical bridge because it could extend familiar private-network operating models over the internet without requiring total redesign. More recent zero-trust thinking grew in response to the realization that encrypted access to a broad internal network is not always the same thing as least-privilege access. VPN remains important, but its historical role is best understood as a practical response to the collapse of physical perimeter security.

How does it work inside?

A VPN connection usually begins with authentication between a user device or network gateway and the VPN endpoint. After identity is established, the two sides create an encrypted tunnel using technologies such as IPsec or TLS. Traffic sent through that tunnel is protected in transit, and internal systems can treat it as arriving from an approved private path instead of from arbitrary public internet addresses. In site-to-site setups, whole networks are linked through their gateways; in remote-access setups, an individual user device joins the tunnel. Routing decisions are part of the design too, because operators must define which destination ranges go through the tunnel and which continue to use the normal internet path.

What is it often confused with?

VPN and zero-trust approaches both aim to secure remote access, but they answer the trust question differently. VPNs often assume that once a user or device is authenticated into the tunnel, broader internal network reachability becomes acceptable. Zero-trust designs instead try to re-evaluate trust continuously based on user identity, device posture, and request context, often exposing only specific applications rather than an entire network segment. That makes VPN simpler to adopt in traditional network environments, but also more prone to over-broad access if a credential or endpoint is compromised. The important distinction is not whether traffic is encrypted, but whether access control is granted at the tunnel boundary or continuously at the resource boundary.

When should you use it?

VPN is well suited to remote staff access, site-to-site links between private networks, and branch connectivity where IP-based private networking still matters operationally. It is particularly useful when internal applications already assume private-network reachability and would be expensive to redesign immediately. The tradeoff is that VPN gateways can become performance or availability bottlenecks as usage grows, and broad tunnel access can make segmentation harder if policy remains coarse. Full-tunnel routing can also degrade user experience by hauling unrelated traffic through centralized gateways. VPN works best when the routing scope and access scope are both designed deliberately rather than treating the tunnel itself as sufficient security.

Remote work -- employees securely accessing internal company systems from homeSite-to-Site VPN -- connecting headquarters, branches, or two data centers as one private networkBranch office connectivity -- linking multiple office networks into a single private networkRegulatory compliance -- protecting sensitive data transfers through encrypted channels