Port Forwarding

Most home routers or gateways use a NAT firewall to protect your home network from the Internet. NAT or Network Address Translation works by hiding your computer’s IP address from internet devices and replacing it with the gateway IP address. It will then forward internet traffic to the proper computer. To further protect your home network, the NAT firewall disallows unrequested traffic from the internet. Some applications, such as Torrents and Remote Access, require unrequested inbound connections. To use these features with your StorCenter device, you will need to configure your router to allow inbound connections for these applications. This is known as Port Forwarding.

The port forwarding process is dependent on the brand and model number of the router being used. Port forwarding of a router is required with your system to allow user access to your DVR. Although a firewall will block all requests from the outside world by default, there may be times when you actually want to allow external users into your network. For example, you want to access your DVR while away from your home or office. Because the default configuration of most firewalls blocks all external requests, you’ll need to open things up using a feature known as port forwarding.

Remember that in almost all cases, your internal network will be configured to use private IP addresses. Because of this, you’ll need to configure your firewall to take requests destined for your public or “real” IP address and forward them to the your DVR. When a user on the Internet needs to contact a DVR, the request is forwarded to the IP address of the DVR, and the port on which the DVR Web server is running. By default, all of our DVRs are configured to listen for requests on TCP port 88. So, what you would need to do in this case is tell the firewall that every time the public IP address receives a request destined for TCP port 88, it should forward the request to TCP port 88 on the Web server running on The manner in which this is configured depends upon the firewall you are using.

BlackBerry VPN

The Blackberry is one of the most popular new smartphones on the market and works for you as a digital assistant and portable media player. Blackberry phones are very secure in general, but if you are using a public WI-FI spot then you are always open to the threat of interception or hacking. For security purposes, it is recommended that you sign up with a provider.

VPN usage on BlackBerry devices seems uncommon because of the other options available, such as making the BlackBerry part of the network so it’s already connected all the time. If your BlackBerry is on one network and the server to which you need to connect is on another, the VPN option may come in handy. Attempting to use VPN on a BlackBerry has met many users with a dead end. There is not much support for VPN on BlackBerry phones and other methods are usually recommended.

A VPN provides an encrypted tunnel between a BlackBerry device and your organization’s network. VPN is the only layer 3 security method that the BlackBerry device supports.

A VPN solution consists of a VPN client on the BlackBerry device and a VPN concentrator. The BlackBerry device can use the VPN client to authenticate with a VPN concentrator, which acts as the gateway to the enterprise Wi-Finetwork. Each BlackBerry device includes a built-in VPN client that supports several VPN concentrators. The VPN client on the BlackBerry device is designed to use strong encryption to authenticate itself with the VPN concentrator. It creates an encrypted tunnel between the BlackBerry device and VPN concentrator that the BlackBerry device and enterprise Wi-Fi network can use to communicate.

After you configure a VPN, the BlackBerry device can use layer 2 security methods to connect to the enterprise Wi-Finetwork, and use the VPN to provide authentication with the enterprise Wi-Fi network. In this scenario, you can configure the enterprise Wi-Fi network as an untrusted network, and specify that only a VPN concentrator can connect to the enterprise Wi-Fi network.

Unlike other supported security methods for enterprise Wi-Fi networks, a VPN does not use the wireless access point during data encryption.

To permit a Wi-Fi® enabled BlackBerry® device to log in to a VPN concentrator automatically after it connects to an enterprise Wi-Fi network, you or a user can configure a VPN profile that includes a user name and password for authentication with the VPN concentrator. Depending on your organization’s security policy, you or the user can save the user name and password for authentication with the VPN concentrator on the BlackBerry device. When you or the user saves the user name and password, the BlackBerry device does not prompt the user for the user name and password the first time or each time that the BlackBerry device connects to the enterprise Wi-Fi network.

The BlackBerry device is also compatible with VPN environments that use two-factor authentication using hardware tokens or software tokens for credentials. When the BlackBerry device tries to log in to the VPN, the BlackBerrydevice uses credentials that the token generates or that the user provides.

Introduction to VPN Ports

Every service that connects to the Internet has a port number, and this is dependent on the software and protocol being used by the VPN service. Establishing a VPN should not be too difficult, but there may be VPN port issues. If your VPN is not working, chances are, it is a port problem.

PPTP VPNs need TCP and UDP port 1723 open and IP port 47 must pass the General Routing Encapsulation (GRE) protocol. L2TP VPNs need TCP and UDP port 1701 and GRE protocol access to port 47.

  • Proxying firewalls and NAT PPTP tunnels can place the VPN server behind the firewall if the firewall supports GRE packet editing. GRE is its own protocol and does not use ports per see but rather call ID numbers to establish sessions. Most firewalls support GRE editing. L2TP VPN servers cannot sit behind a proxying or NAT firewall. L2TP packets hitting the firewall cannot route to a VPN server behind the firewall because the protocol encrypts the GRE header in the packet, making it impossible to edit.


  • Router to Router Connections

To create a tunnel between two Windows 2000 RRAS servers, you have to make sure each server contains a dedicated user account for the other server to log in with. Each server must also contain a demand-dial VPN connection named the same name as the login credentials the other computer will use. For example, if Server A will be connecting to Server B using account name VPN1, Server B must contain a user account named VPN1 and a demand-dial RRAS connection named VPN1. Likewise, the connection on Server A should be named the same as the login account Server B will authenticate with, say, VPN2. This will allow the servers to connect and create the proper routing entries.

  • L2TP with no certificates

L2TP tunnels are considered more secure than PPTP tunnels because the IP headers are encrypted under L2TP, preventing hackers from even seeing what type of tunnel traffic is being encrypted, let alone the traffic itself. There is a misconception that L2TP requires each VPN server to trust a common certificate authority. If this is a problem for your environment, the RRAS documentation includes a method for configuring each VPN server with an identical “shared secret” that can be used in place of a normal certificate. If you are not going to use certificates, make sure the shared secret is impossible to break – make it long 20+ characters with a mix of symbols, uppercase letters, lowercase letters and numbers.

Torrent VPN

VPN is a special secured channel in your general unsafe Internet connection between your PC, iPad or iPhone and vpn server. It lets to encrypt all your traffic and hide your read IP. So it is safe and easy to download torrents with torrent vpn. Many Internet users are not familiar with vpn and do not know how to use it so they try to avoid this technology. It is not necessary to stand in awe of vpn service. It is really fast and easy to set up new vpn connection and vpn account can help you to avoid many problems with torrent downloads. Torrent vpn is your security and privacy in the network.

Bittorents are extremely popular today. People use p2p services to share some files like music, videos, etc. In some countries people use torrents without any scares. But if you live in USA or some other country where p2p are prohibited you must be careful downloading torrents. I am not sure what punishment can be used for those who share and download torrents but in any case is it a good idea to stay anonymous and hide your IP if you download bittorents.

To be safe and secured and for anonymizing bittorents you can use personal vpn account. VPN is a special secured channel from your PC to vpn server. VPN hides your IP and codes all the traffic sent through vpn. So it is safe and easy to download bittorrents with torrent vpn. Lots of Internet users are not familiar with vpn but this is not the reason to avoid it. Personal vpn account can help you to download torrents safely and secured.

There are free and paid vpn, but none could suggest free services because they are not very reliable. So your vpn tunnel can be disconnected anytime and your IP will be visible. If you need reliable and secure vpn account to download torrents safely recommend is paid vpn service. It is safe to download torrents with p2p vpn service. Choosing a vpn provider remember that USA vpn will not suit you because torrents are forbidden in the United States so you need to select another country. European vpn service is a good variant for this. When your vpn tunnel is ready you can download torrents safely and be sure that your privacy is under control.

VPN service is the easiest solution to bypass Internet filters and unblock restricted sites. The files you download are foreign and you should treat them as such; scan them promptly after downloading them.  Most major anti-virus programs have the ability to add folders for auto-scanning, which is probably the ideal solution if you either don’t have time or don’t want to waste effort doing things manually.

On the more serious side, it shouldn’t be any surprise that your IP address is very easy to trace.  While many people have never had problems, that doesn’t mean you shouldn’t worry about things.  In addition to people just eavesdropping on your connections, your downloads can also suffer.  There are increasing incidents of “bad traffic,” peers who send corrupt data in response to BitTorrent calls, forcing users to have to re-download those sections of their files.  Users who transfer copyright-infringing material also have to worry about getting caught via these same methods.  We at How-To Geek don’t condone piracy, of course, but we do support security, and the best way to stay secure is to stay informed.

VPN softwares

VPN Software helps you to connect to the internet with the help of its easy to use interface. VPN service providers nowadays either offer their own client software or integrate the capabilities of Overplay VPN to help their customers allow easy approachability to internet while being hidden. In both the cases, these software are of much help and make it far easier to connect to the www than doing it manually.

VPN softwares are widely used to establish remote connections between two geographically separated locations. This can take the form of a connection between two fixed sites, in which the VPN is stateful and the connection is permanent, usually requiring client software on both sides.

Alternately, VPN software can facilitate a connection between a fixed site and multiple temporary sites, such as when an e-commerce company wishes to establish a secure connection between itself and a client for the purpose of making a single transaction.

Software available is plentiful, inexpensive and relatively easy to set up and maintain. OpenVPN Technologies has a set of VPN offerings to provide highly callable and reliable communications services. The open source product is a de facto standard and is widely used. The company offers both a server product and a hosted service. The OpenVPN Access Server, an SSL VPN software package, can be used in Windows, Mac, and Linux environments, and can accommodate remote access to internal network or private cloud resources, with fine-grained access control. The OpenVPN Hosted Service is an SSL VPN service offering the OpenVPN Server capabilities as a cloud service offering. Also available is the OpenVPN Access Server Virtual Appliance, an SSL VPN virtual appliance with the same capabilities.

Most of the VPN vendors have their own client software through which they provide capable services to their customers. A prominent name in this context is Overplay VPN. The firm offers extended support for the known protocols such as PPTP, L2TP and OpenVPN through its feature rich and robust VPN client software. Depending on the package you buy from the company, you will be entitled to use the services of related protocol by selecting the server locations currently supported by it.


The software possesses an appealing interface and is laced with all the useful capabilities that is desired in an upmarket VPN client. It is safe, secure and duly encrypted. In addition, it allows to see your account details, checkout your IP address, know about the VPN provider and issues related to its services in detail in its knowledge base and FAQ sections, and so on. This is however one single example where a VPN service provider ofers its own client software, there are many more in the market.


Windows shops have an easy option with the point-to-point tunneling protocol (PPTP), which ships with Microsoft Windows. The protocol for implementing VPNs doesn’t by itself describe any encryption or authentication features, but instead implements security by the PPP protocol that is being tunneled. The PPTP that ships with Windows however, does offer different levels of authentication and encryption as a standard feature of the PPTP stack. It offers security equivalent to any other VPN product. All recent versions of Windows include a PPTP client, which is limited to two concurrent outbound connections. Linux distributions also recently started supporting PPTP, as has the Mac OS X.

An alternate tunneling protocol is L2TP (layer 2 tunneling protocol). L2TP by itself does not provide for encryption or confidentiality. However, it is used in conjunction with IPSec, which is more secure. Once the connection is established, the L2TP packets are encapsulated by IPSec. The L2TP packets are therefore hidden within the IPSec packet, so the encrypted packet can reveal no information to any potential intruders about the internal network.

VPN components

VPN components can run alongside other software on a shared server, but this is not typical, and it could put the security and reliability of the VPN at risk. A small business that isn’t outsourcing its VPN services might deploy firewall and RADIUS software on generic servers. However, as a business’s VPN needs increase, so does its need for equipment that’s optimized for the VPN. The following are dedicated VPN devices a business can add to its network. You can purchase these devices from companies that produce network equipment, such as Cisco:

  • VPN Concentrator — This device replaces an AAA server installed on a generic server. The hardware and software work together to establish VPN tunnels and handle large numbers of simultaneous connections.
  • VPN-enabled/VPN-optimized Router — This is a typical router that delegates traffic on a network, but with the added feature of routing traffic using protocols specific to VPNs.
  • VPN-enabled Firewall — This is a conventional firewall protecting traffic between networks, but with the added feature of managing traffic using protocols specific to VPNs.
  • VPN Client — This is software running on a dedicated device that acts as the tunnel interface for multiple connections. This setup spares each computer from having to run its own VPN client software.

iPhone VPN

Many people access internet via iphone in the public place and Wifi is a great tech. It’s so easy and the speed is good, the most important is: it’s FREE, there are many hotspots out there provide FREE internet access, so, everybody like that especially the hackers.

Apple knows Wifi is not that safe, so, iphone got a VPN feature, it can encrypt your data and protects your identity and allows you to bypass local firewalls and network filters. It means nobody knows what did you do with your iphone, even the hackers and your boss (some company blocked some certain websites to their employee). Using an iPhone on cellular networks, private networks and public Wi-Fi hotspots exposes your device to multiple security threats. Hackers scan for vulnerable devices in order to steal credit card data and other sensitive information.

Many websites use location based IP blocking to restrict access. VPN allows you to bypass location-based IP blocking and access your favorite American, European, and Asian websites securely from anywhere in the world. Best iPhone has become a very well-known mobile phone ever since its release by the apple company Incin 2007. Being empowered with multi-media features, it became a wrath with clients all over the planet. What makes apple iphone so well-known with individuals is its multi-functional adaptability. Being outfitted to run online, clients can accessibility messages and accessibility any website of their option. If you are able to do all this from a single handheld-device, it absolutely is going to be awesome and well-known product. Due to its multi-functional features, apple iphone issue full product for individuals from all of all ages. Enterprise clients would find it awesome device to keep touching their business even when they are away as it can provide the feature so far phone as well as laptop computer.

Important for Online Security Much like any other product such as PC’setc, iPhone being linked with online either through Wi Fior3 Gis susceptible to online problems. Online risks continue to be same whether you are linked with online via computer or smartphones on the market. It is very important to protect your information as there is actual risk of it being affected while browsing online.

There are several resources available which are used by clients to protected their information but none of them has been found to be as effective as getting the best apple iphone VPN. What is more, VPN (virtual personal network) can quickly be designed on all design so for iPhones. iPhone clients can protected their information from all prospective coughing problems using VPN technological innovation as it uses the best encrypted shield an internet-based protection methods. So, all information going out from your hand-held product is secured before being tunneled through a protected personal road through online. Besides, on getting the best iPhone VPN, a person is allocated a hosting server produced IP deal with placed in another nation. However, your actual IP deal with is hidden for all online looking requirements. Due to this, clients would be able to look at the World Wide Web anonymously without any stress so their information or protection being affected. Marketing organizations will not be able to focus on you successfully as the information gathered by the according to your allocated IP is that of the hosting server not yours.

VPN-Unblock internet iPhone clients in nations around the world like Kuwait, Saudi Arabic, Jordan, etc, deal with several problems because of censorship of online. However, all is not missing for citizens; there is still wish for clients in these nations around the world to accessibility internet sites of their option. By getting best iPhone VPN consideration, clients can experience full independence in looking internet sites of their option on online. VPN technological innovation quickly bypasses the protection cycle put in place by local firewalls in these nations around the world. As for expats, VPN provides an amazing possibility as it allows them to accessibility many geo restricted buffering internet sites even while living in overseas nations around the world. For example, expats from US would be able to accessibility internet sites like Blockbuster online, Hulu, etc, on getting VPN consideration designed with their iPhones. For opening most of these geo-restricted internet sites, you need to have US centered IP deal with. And VPN can quickly do this for you

VPN For Android OS

Nowadays it is required being mobile and that is why Android tablet like others pocket PC are really popular today. Mostly we use public Wi-Fi on mobile devices like Android tablet and this can be very unsafe due to low security in such networks. Android VPN is a virtual private network between your android and vpn server. It hides real ip address and can change it to USA, Canada, Europe or another country IP. 

Android phones generally include a built-in VPN client, which you can find in the Settings | Wireless & networks menu. In most of the places, internet sites can be adequately used however; there are still some regional places that are administration by the specific censorship administration bodies. To use online while in any of these places, taking help of Android VPN would therefore be beneficial.

Even the mobile manufacturers have been quick to involve VPN function in their newest operating system gadgets, popular of them being New samsung, HTC, LG, Panasonic Ericcson, Dell, Samsung, Liven and many more. Furthermore, it is not that hard to manage it in these mobile gadgets. Net informed customers are likely to deal with no problem while making it. Even the beginner customers are not supposes to have that much difficult time, the instructions courses given by the VPN suppliers for each of the well known operating system mobile mobile phones act as a able help in this perspective.

First, in order to use virtual private networking, you need a VPN server configured on the network to which you want to connect. Most business networks that allow remote access will have a VPN server set up. At home, you can set up your desktop or laptop computer to be a VPN server (of course, you’ll need to leave it on when you’re gone so you can connect to it). The steps for doing that depend on what desktop operating system you’re using.

One way smartphones help us work smarter is by allowing device users to connect to VPN networks. The Android platform has an outstanding built-in VPN connection tool that allows you to connect to PPTP VPNS, L2TP VPNs, L2TP/IPSec PSK VPNs, and L2TP/IPSec CRT VPNs. This is a walkthrough of how Android users can set up and connect to a VPN with the help of a PPTP VPN. It is very easy to use VPN on your Android and you do not need to setup any special application.

Difference between a Proxy and VPN

A proxy server is a server that acts as an intermediary, relaying your request for connection to a webpage, file, or service on the Internet. The location of the proxy server could be physically anywhere in the world. The recipient of the request (e.g a website, service or file) will only see the request for connection coming from the proxy server. The recipient will not know that you were the source of the original request.

The main use of anonymizing proxy servers are: Protecting the identity of the computer behind it and avoiding geographic restrictions.

Pros: Many free solutions; Anonymises your web browsing and Unlocks geographic restrictions.

Cons: There is generally little or no encryption provided, so all information being sent by you through the proxy server is completely transparent and can be intercepted. With an SSL proxy, communications from the client to the proxy are correctly protected.

-Connection speed with free proxy servers is generally slow. Bandwidth costs money.

-Plenty of free solutions require software installs, and or display intrusive adds to pay for the running of the service.

-Many proxy server IP addresses are known as sources of spam and are blocked by the end destination site.

-Beware anonymizing proxy services declaring themselves VPNs.

As with Anonymous proxy providers, trusting your VPN service provider is vitally important. There is a growing source of VPN services, but not all are trustworthy. Most types of VPNs require a software installation. Proxy services DO have a use, but they have limitations and risks attached. Reliable VPN services will generally have a cost attached to them.

Whilst both of these technologies reroute your computers network internet connection and change your IP address they do work in slightly different ways and the products co-exist as customer compatibility with either or both may vary based on firewall security and/or ISP provisions.

Think of a proxy server as a kind of filter, in simple terms the proxy settings are applied to your chosen internet browser (i.e. Internet Explorer, Mozilla Firefox etc).  Then when browsing web pages they are routed to you via the proxy with all the benefits associated with the proxy server (i.e. security, speed, geographic location etc).

Unlike a proxy, which only secures the internet browser or software application with the proxy data entered into it, VPN (Virtual Private Network) encrypted tunnelling encrypts all your internet access, effectively replacing your local ISP routing 100% for all applications with all the benefits associated with the VPN server (i.e. security, speed, geographic location etc).  VPN can easily be connected or disconnected with a click on a desktop icon. In conclusion a proxy is purely browser based and has less compatibility with certain websites that use non-browser technology (i.e. Zattoo, View TV, 4OD, Sky Player, FOX OD etc); whereas VPN will work with all internet based services but offers less choice on which applications you route through the external server; as with VPN everything is routed whilst you are connected to it.

Starting with the differences between what they are essentially: a proxy is an intermediary computer which communicates on behalf of another computer. A VPN is an emulation of a private local network connection over public networks or the Internet.

The VPN connection has a series of advantages over a proxy:

  • VPN connections are much more stable than proxies
  • no further configuration is needed for applications to work under a VPN connection
  • VPN connections are more secure than proxies. There are lots of transparent proxies and even anonymous proxies cannot be fully trusted
  • not all applications are compatible with proxy usage and most applications need special configuration to work with a proxy
  • Most VPN connections have higher speed and uptime than proxy servers and will provide a pleasant browsing experience.

iPhone VPN

Secure access to private corporate networks is available on iPhone using established industry-standard VPN protocols. Users can easily connect to enterprise systems via the built-in VPN client or through third-party applications from Juniper and Cisco. Out of the box, iPhone supports Cisco IPSec, L2TP over IPSec, and PPTP. If your organization supports one of these protocols, no additional network configuration or third-party applications are required to connect iPhone to your VPN. Additionally, iPhone supports SSL VPN, enabling access to Juniper SA Series and Cisco ASA SSL VPN servers. Users simply download a VPN client application developed by Juniper or Cisco from the App Store to get started. Like other VPN protocols supported on iPhone, SSL VPN can be configured manually on iPhone or via Configuration Profile.

iPhone supports industry-standard technologies such as IPv6, proxy servers, and split tunneling, providing a rich VPN experience when connecting to corporate networks. And iPhone works with a variety of authentication methods including password, two factor token and digital certificates. To streamline the connection in environments where certificate-based authentication is used, iPhone features VPN On Demand, which dynamically initiates a VPN session when connecting to specified domains.

iPhone VPN protects your privacy. When you have a VPN for your smartphone, you have access to four primary advantages over standard internet browsing:

-Stop ISP Inspections. Prevent your internet service provider from throttling, prioritizing, and inspecting the data that goes in and out of your iPhone.

-Protect the Activities That You Do Online. A VPN is a secure “tunnel” that takes you to the internet. With a VPN, you get to cruise the internet your way, not someone else’s way.

-Protect Your IP Address. With an iPhone VPN, the only thing websites will see is the server’s communications.

-Prevent Location Identification. With a VPN, your IP address is substituted for one that is not based on your location. This prevents location-based ads from affecting your internet experience.

Some people feel that an iPhone VPN is actually very limiting. With a VPN tunnel, you can access country specific sites, but not sites outside that country. Though limiting, this type of connection provides the greatest amount of security for the end user. That is why you should use a global VPN provider for your iPhone VPN needs. Global VPN providers have servers located around the world and allow you to access your favorite websites from anywhere. If you need to access a secure site in France, but you live in Canada, you can log into the French VPN and have a high speed connection.

One of the difficulties that VPN providers face is limited resources and a reliance on third parties. If you are choosing an iPhone VPN provider, you should look for one that can provide you with many IP addresses. For the most reliable connections the provider should write their own server software, own their own hardware, and manage their own network.