Re: POP and SMTP through HTTP
You sound like a bloke who knows what he's on about.
I wouldn't bet on that :rollin . I think you are missing a winking smiley on the end there .
I assume you are talking about a Virtual Private Network.
Basically a remote user will dial up directly to a VPN Server and create a link.
All comms will be to and from that VPN Server.
The remote user will package up data into a datagram with some IP header info. All of this datagram (including the IP header) is encrypted in some way (probably using asymmetrical encryption). This encrpyted datagram is then placed as the payload inside another datagram "wrapper" which has it's own header. The wrapper header contains the address of the VPN Server as the destination. The datagram is then sent to the VPN Server which removes the encrpyted payload and decrypts it. The decrpyted payload contains the address of the internal target machine which the remote user is trying to connect to.
Because the entire IP address is encrypted, no-one outside the VPN Server can read the address of the target and therefore the target is effectively invisible to the outside world.
The VPN server MIGHT be either outside the firewall or might allow SMTP access itself.
Either that or he is only able to access WebMail on his ISP.
I'd be surprised if he was able to run MS Outlook through that method.
You sound like a bloke who knows what he's on about.
I wouldn't bet on that :rollin . I think you are missing a winking smiley on the end there .
I assume you are talking about a Virtual Private Network.
Basically a remote user will dial up directly to a VPN Server and create a link.
All comms will be to and from that VPN Server.
The remote user will package up data into a datagram with some IP header info. All of this datagram (including the IP header) is encrypted in some way (probably using asymmetrical encryption). This encrpyted datagram is then placed as the payload inside another datagram "wrapper" which has it's own header. The wrapper header contains the address of the VPN Server as the destination. The datagram is then sent to the VPN Server which removes the encrpyted payload and decrypts it. The decrpyted payload contains the address of the internal target machine which the remote user is trying to connect to.
Because the entire IP address is encrypted, no-one outside the VPN Server can read the address of the target and therefore the target is effectively invisible to the outside world.
The VPN server MIGHT be either outside the firewall or might allow SMTP access itself.
Either that or he is only able to access WebMail on his ISP.
I'd be surprised if he was able to run MS Outlook through that method.
Comment