Conceptly
← All Concepts
πŸ”

VPN

InfrastructureAn encrypted private network tunnel over the internet

A VPN (Virtual Private Network) creates an encrypted virtual tunnel over the public internet, connecting users or networks as if they were on a private link. It's used for remote workers accessing internal systems, linking branch offices, and connecting on-premises to cloud.

β–ΆArchitecture Diagram

πŸ” Structure

Dashed line animations indicate the flow direction of data or requests

Why do you need it?

Remote employees, branch offices, and hybrid infrastructure all need access to internal resources without turning those resources into openly reachable internet services. Simply opening ports to the public internet creates too much risk, while blocking everything makes legitimate work impossible. The challenge is to build a path across an untrusted network that behaves enough like a trusted private link to be useful. That path has to protect traffic in transit and make sure only authorized users or networks can enter it. VPN addresses this by creating an encrypted tunnel over public infrastructure rather than requiring a physically private path.

Why did this approach emerge?

When systems primarily lived inside office buildings, physical location functioned as a meaningful security boundary. As remote work, cloud adoption, and distributed teams became normal, that assumption weakened. Organizations still needed private-style connectivity, but now across public networks. VPN became the practical bridge because it could extend familiar private-network operating models over the internet without requiring total redesign. More recent zero-trust thinking grew in response to the realization that encrypted access to a broad internal network is not always the same thing as least-privilege access. VPN remains important, but its historical role is best understood as a practical response to the collapse of physical perimeter security.

How does it work inside?

A VPN connection usually begins with authentication between a user device or network gateway and the VPN endpoint. After identity is established, the two sides create an encrypted tunnel using technologies such as IPsec or TLS. Traffic sent through that tunnel is protected in transit, and internal systems can treat it as arriving from an approved private path instead of from arbitrary public internet addresses. In site-to-site setups, whole networks are linked through their gateways; in remote-access setups, an individual user device joins the tunnel. Routing decisions are part of the design too, because operators must define which destination ranges go through the tunnel and which continue to use the normal internet path.

Boundaries & Distinctions

VPN and TLS both use encryption, but they protect at different scopes. TLS secures a single application-level connection, such as between a browser and a web server or between an application and a database. VPN creates a broader tunnel at the network level and wraps all traffic that passes through it in one encrypted path. When protecting a specific service connection, TLS is the natural fit; when the goal is to securely bridge an entire network β€” for remote workers or branch offices β€” VPN is the right tool. VPN and firewall both appear in perimeter security design, but their roles are distinct. VPN creates an encrypted tunnel that brings trusted users onto the internal network. A firewall enforces access control policy and decides which traffic is allowed through. What a VPN-connected user can actually reach is determined by firewall rules, so the two need to be designed together for security to hold. VPN and SSH tunneling both create encrypted paths, but at different scales of intent. VPN connects an entire network β€” treating the remote user or branch as part of the same private network. SSH tunneling is lighter: it covers a single server connection or specific port forward. For a remote workforce or a full branch office link, VPN is the right scope; for a single-server access or a temporary tunnel, SSH is simpler. A VPN that gives broad internal network access after tunnel entry can widen the blast radius if a credential is compromised. Designing the tunnel scope and access permissions together β€” not just authentication β€” is what makes a VPN deployment secure.

When should you use it?

VPN is well suited to remote staff access, site-to-site links between private networks, and branch connectivity where IP-based private networking still matters operationally. It is particularly useful when internal applications already assume private-network reachability and would be expensive to redesign immediately. The tradeoff is that VPN gateways can become performance or availability bottlenecks as usage grows, and broad tunnel access can make segmentation harder if policy remains coarse. Full-tunnel routing can also degrade user experience by hauling unrelated traffic through centralized gateways. VPN works best when the routing scope and access scope are both designed deliberately rather than treating the tunnel itself as sufficient security.

Remote work -- employees securely accessing internal company systems from homeSite-to-Site VPN -- connecting headquarters, branches, or two data centers as one private networkBranch office connectivity -- linking multiple office networks into a single private networkRegulatory compliance -- protecting sensitive data transfers through encrypted channels