0% found this document useful (0 votes)
26 views11 pages

Vpn-Virtual Private Network

The document discusses the importance and functionality of Virtual Private Networks (VPNs) in providing secure communication for businesses with multiple branches. It highlights how VPNs facilitate cost-effective data transfer and connectivity between remote employees and the main office. Additionally, it addresses the limitations of traditional communication methods and the advantages of using VPN technology.

Uploaded by

mejd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views11 pages

Vpn-Virtual Private Network

The document discusses the importance and functionality of Virtual Private Networks (VPNs) in providing secure communication for businesses with multiple branches. It highlights how VPNs facilitate cost-effective data transfer and connectivity between remote employees and the main office. Additionally, it addresses the limitations of traditional communication methods and the advantages of using VPN technology.

Uploaded by

mejd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

www.ITNAT.com 1 Bill_Gaties@hotmail.

com

: ‫ﻣﺸﺎﺭﻛﺔ ﺑﻌﻨﻮﺍﻥ‬

VPN- ‫ـﺔ‬
‫ـﻴﺔ اﳋﺎﺻــ‬
‫ـﺸﺒﻜﺔ اﻻﻓﱰاﺿــ‬
‫اﻟــ‬
Virtual Private Network.
‫‪www.ITNAT.com‬‬ ‫‪2‬‬ ‫‪[email protected]‬‬

‫ﲢﻴﺔ ﻟﻠﺠﻤﻴﻊ‪،،،‬‬

‫ﻫﺬﻩ ﻣﺸﺎﺭﻛﺔ ﺃﲢﺪﺙ ﻓﻴﻬﺎ ﻋﻦ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ ﻭﺍﻧﺘﺸﺎﺭﻫﺎ ﰲ ﺍﻵﻭﻧﺔ ﺍﻷﺧﲑﺓ ﺑﺸﻜﻞ ﻛـﺒﲑ ﺟـﺪﹰﺍ‬
‫ﻭﻷﳘﻴﺘﻬﺎ ﺍﻷﻣﻨﻴﺔ ﻭﺍﻟﺘﺠﺎﺭﻳﺔ‪ ،‬ﺃﺣﺒﺒﺖ ﺃﻥ ﺃﺗﻘﺪﻡ ﻟﻜﻢ ﻬﺑﺬﻩ ﺍﳌﺸﺎﺭﻛﺔ ﺭﺍﺟﻴﹰﺎ ﻣﻦ ﺍﷲ ﺃﻥ ﺗﻜﻮﻥ ﰲ ﺍﳌـﺴﺘﻮﻯ‬
‫ﺍﻟﺬﻱ ﺃﺭﻳﺪﻩ‪.‬‬
‫‪www.ITNAT.com‬‬ ‫‪3‬‬ ‫‪[email protected]‬‬

‫ﺍﻟﺸﺒﻜﺔ ﺍﳋﺎﺻﺔ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ‪:‬‬

‫ﻫﻲ ﻧﻮﻉ ﻣﻦ ﺍﻟﺸﺒﻜﺎﺕ ﻟﺘﺨﺪﱘ ﺍﳌﺸﺎﺭﻳﻊ ﻭﺍﻟﺸﺮﻛﺎﺕ ﺍﻟﻜﺒﲑﺓ ﻭﺍﳌﻜﺎﺗﺐ ﺍﻟﱵ ﻟﺪﻳﻬﺎ ﻓﺮﻭﻉ ﻭ ﺃﻗـﺴﺎﻡ ﰲ‬
‫ﻣﻨﺎﻃﻖ ﳐﺘﻠﻔﺔ‪ ،‬ﺗﺆﻣﻦ ﻟﻠﻤﺸﺘﺮﻛﲔ ﰲ ﻫﺬﻩ ﺍﳋﺪﻣﺔ ﺷﺒﻜﺔ ﺧﺎﺻﺔ ﻟﻼﺗﺼﺎﻝ )ﳎﻤﻮﻋﺔ ﻓﻴﻤﺎ ﺑﻴﻨـﻬﻢ ( ﺑﻐـﺾ‬
‫ﺍﻟﻨﻈﺮ ﻋﻦ ﺍﻷﻣﺎﻛﻦ ﺍﳉﻐﺮﺍﻓﻴﺔ ﳌﻮﺍﺿﻌﻬﻢ ﻣﻦ ﺧﻼﻝ ﺍﻻﺳﺘﻔﺎﺩﺓ ﻣﻦ ﺷﺒﻜﺔ ﻭﻣﻘﺎﺳﻢ ﺍﳌﺆﺳﺴﺔ‪ ،‬ﻭﳝﻜـﻦ ﺃﻥ‬
‫ﲢﺘﻮﻱ ﻋﻠﻰ ﻣﻘﺎﺳﻢ ﻓﺮﻋﻴﺔ ﺃﻭ ﻣﺸﺘﺮﻛﲔ ﻋﺎﺩﻳﲔ‪ ،‬ﻫﺬﻩ ﺍﻟﺸﺒﻜﺔ ﲤﻨﺢ ﻣﺸﺘﺮﻛﻴﻬﺎ ﻣﻴﺰﺍﻬﺗﺎ ﻋﻦ ﻃﺮﻳﻖ ﻣﻨﺤﻬﻢ‬
‫ﺃﺭﻗﺎﻣﺎ ﺧﺎﺻﺔ ﻟﻴﺘﻤﻜﻨﻮﺍ ﻣﻦ ﺍﻟﺘﺨﺎﻃﺐ ﻓﻴﻤﺎ ﺑﻴﻨﻬﻢ‪ ،‬ﻛﻞ ﺷﺒﻜﺔ ﺧﺎﺻﺔ ﺍﻓﺘﺮﺍﺿﻴﺔ ﳝﻜـﻦ ﺃﻥ ﺗﺄﺧـﺬ ﺭﻣـﺰ‬
‫)‪ (code‬ﺧﺎﺹ ﻬﺑﺎ‪.‬‬

‫‪Virtual Private‬‬ ‫ﺃﻥ ﻓﻜﺮﺓ ﺍﻟﺸﺒﻜﺔ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ ﺍﳋﺎﺻﺔ ﺃﻭ ﻣـﺎ ﻳﻌـﺮﻑ ﺑﺎﻟـــ‬
‫‪ Network‬ﺍﺧﺘﺼﺎﺭ ﻟـ‪ ،VPN‬ﻗﺪ ﺳﺎﳘﺖ ﰲ ﲣﻔﻴﺾ ﺗﻜﺎﻟﻴﻒ ﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳋﺎﺻﺔ ﺑﺎﻟﺸﺮﻛﺎﺕ‬
‫ﻭﺍﳌﺆﺳﺴﺎﺕ ﺑﲔ ﻓﺮﻭﻋﻬﺎ ﺍﻟﺒﻌﻴﺪﺓ ﻋﻦ ﺍﳌﻘﺮ ﺍﻟﺮﺋﻴﺴﻲ ﳍﺎ ﻭﺑﲔ ﺍﳌﺴﺘﺨﺪﻡ ﺍﳌﱰﱄ ﺍﻟﺬﻱ ﻳﺮﻳﺪ ﺍﻟﻮﺻـﻮﻝ ﺇﱄ‬
‫ﻣﻌﻠﻮﻣﺎﺗﻪ ﺍﳌﺘﻮﻓﺮﺓ ﰲ ﺟﻬﺎﺯ ﺍﳊﺎﺳﺐ ﺍﳌﱰﱄ‪.‬‬

‫ﻗﺪ ﲤﺘﻠﻚ ﺷﺮﻛﺔ ﻣﻦ ﺍﻟﺸﺮﻛﺎﺕ ﻣﻜﺘﺒﹰﺎ ﻭﺍﺣﺪﹰﺍ‪ ،‬ﻭﻗﺪ ﲤﻠﻚ ﻣﻜﺎﺗﺐ ﻣﻮﺯﻋﺔ ﰲ ﺃﳓﺎﺀ ﳐﺘﻠﻔﺔ ﻣﻦ ﺍﻟـﺒﻼﺩ ﺃﻭ‬
‫ﺧﺎﺭﺝ ﺍﻟﺒﻼﺩ‪ ،‬ﻗﺪ ﻳﻌﻤﻞ ﻣﻮﻇﻔﻮﻫﺎ ﻣﻦ ﺍﳌﻜﺘﺐ ﺍﻟﺮﺋﻴﺴﻲ ﳍﺎ ﺃﻭ ﻣﻦ ﺧﻼﻝ ﺍﳌﻜﺎﺗﺐ ﺍﳌﻮﺯﻋﺔ ﰲ ﺃﳓﺎﺀ ﺍﻟﺒﻼﺩ‬
‫ﺃﻭ ﺣﱴ ﻣﻦ ﺧﻼﻝ ﺑﻴﻮﻬﺗﻢ ﺃﻭ ﻣﻮﺍﻗﻌﻬﻢ ﺍﻟﺒﻌﻴﺪﺓ ﻛﺤﻘﻮﻝ ﺍﻟﻨﻔﻂ ﰲ ﺍﻟﺒﺤﺎﺭ‪ ،‬ﰲ ﻣﺜﺎﻝ ﺍﻟﺸﺮﻛﺔ ﺫﺍﺕ ﺍﳌﻜﺘﺐ‬
‫ﺍﻟﻮﺍﺣﺪ‪ ،‬ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﺩﻳﺔ ﺃﻭ ﻣﺎ ﻳﻌﺮﻑ ﺑﺎﻟـ ‪ Area Network Local‬ﻭﺍﻟـﱵ‬
‫ﺗﻌﺮﻑ ﺍﺧﺘﺼﺎﺭﹰﺍ ﺑﺎﻝ ‪ LAN‬ﺑﺎﺳﺘﺨﺪﺍﻡ ﺗﻘﻨﻴﺔ ﺍﻻﻧﺘﺮﻧﺖ‪ ،‬ﻗﺪ ﻳﻜﻔﻲ ﻹﻳـﺼﺎﻝ ﺭﻭﺍﺑـﻂ ﻛﺎﻓـﺔ ﺃﺟﻬـﺰﺓ‬
‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﺍﳌﻮﺟﻮﺩﺓ ﰲ ﺍﳌﻜﺘﺐ ﻣﻊ ﺑﻌﻀﻬﺎ ﺍﻟﺒﻌﺾ‪ ،‬ﻭﻟﻜﻦ ﰲ ﺣﺎﻟﺔ ﺍﳌﻜﺎﺗﺐ ﺍﻟﺒﻌﻴـﺪﺓ ﻛﺎﻷﻣﺜﻠـﺔ ﺍﻟـﱵ‬
‫ﺫﻛﺮﻧﺎﻫﺎ ﺑﺎﻷﻋﻠﻰ‪ ،‬ﻓﺄﻥ ﺍﻟﺸﺮﻛﺔ ﰲ ﻫﺬﻩ ﺍﳊﺎﻟﺔ ﲢﺘﺎﺝ ﻏﻠﻲ ﺷﻲﺀ ﺃﺧﺮ ﻏﲑ ﺇﻝ ‪.LAN‬‬

‫ﰲ ﺍﳌﺎﺿﻲ ﻛﺎﻥ ﺍﳌﺴﺘﺨﺪﻡ ﺍﻟﺒﻌﻴﺪ ﺃﻭ ﺍﳌﻮﻇﻒ ﺍﻟﺬﻱ ﻳﻌﻤﻞ ﻣﻦ ﻣﻨﻄﻘﺔ ﺑﻌﻴﺪﺓ ﻋﻦ ﺍﳌﻘﺮ ﺍﻟﺮﺋﻴﺴﻲ ﻟﻠـﺸﺮﻛﺔ‬
‫ﻳﺘﺼﻞ ﻣﻦ ﺧﻼﻝ ﻣﻮﺩﻡ ﻋﺎﺩﻱ ﻟﻠﺸﺮﻛﺔ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺧﻄﻮﻁ ﺍﳍﺎﺗﻒ‪ ،‬ﻳﻘﻮﻡ ﺳﲑﻓﺮ ﻭﻣﻮﺩﻡ ﺃﺧﺮ ﻣﻮﺟﻮﺩﺍﻥ ﰲ‬
‫ﻣﻘﺮ ﺍﻟﺸﺮﻛﺔ ﺑﺎﻟﺮﺩ ﻋﻠﻲ ﺍﺗﺼﺎﻝ ﺍﳌﻮﻇﻒ ﻟﻴﻘﻮﻡ ﺑﻌﻤﻠﻪ ﻭﻳﺘﻢ ﺃﻗﻔﺎﻝ ﺍﳋﻂ ﺑﻌﺪ ﺍﻻﻧﺘﻬﺎﺀ ﻣﻦ ﺍﻟﻌﻤﻠﻴﺔ‪.‬‬

‫ﺳﻠﺒﻴﺎﺕ ﻫﺬﻩ ﺍﻟﻄﺮﻳﻘﺔ ﻛﺎﻧﺖ ﻣﻦ ﻋﺪﺓ ﻧﻮﺍﺣﻲ ﻣﻨﻬﺎ‪:‬‬


‫‪ .1‬ﻛﻠﻔﺔ ﻓﻮﺍﺗﲑ ﺍﳍﺎﺗﻒ ﺍﳌﺘﺼﻞ ﻣﻨﻪ ﺍﳌﺴﺘﺨﺪﻡ ﺍﻟﺒﻌﻴﺪ‪.‬‬
‫‪ .2‬ﺃﳚﺎﺭ ﺍﳋﻄﻮﻁ‪.‬‬
‫‪ .3‬ﺳﺮﻋﺔ ﺍﻻﺗﺼﺎﻝ ﺍﻟﺒﻄﻴﺌﺔ‪.‬‬
‫‪ .4‬ﺑﺎﻹﺿﺎﻓﺔ ﺇﱄ ﺇﺷﻐﺎﻝ ﺧﻂ ﺍﳍﺎﺗﻒ ﺃﺛﻨﺎﺀ ﻓﺘﺮﺓ ﺍﻻﺗﺼﺎﻝ‪.‬‬
‫‪www.ITNAT.com‬‬ ‫‪4‬‬ ‫‪[email protected]‬‬

‫ﺭﻏﻢ ﻫﺬﻩ ﺍﻟﺴﻠﺒﻴﺎﺕ ﻛﺎﻧﺖ ﺍﻟﻌﻤﻠﻴﺔ ﻧﻮﻋﹰﺎ ﻣﺎ ﺁﻣﻨﺔ ﻷﻬﻧﺎ ﻛﺎﻧﺖ ﺗﺼﻞ ﺍﻟﻄﺮﻓﺎﻥ ﺑـﺸﺒﻜﺔ ﻣﻐﻠﻘـﺔ ﻭﻣـﺴﺎﺭ‬
‫ﺧﺎﺹ‪ ،‬ﻛﺎﻧﺖ ﺍﻟﺸﺮﻛﺔ ﺍﳌﻘﺘﺪﺭﺓ ﺗﺴﺘﺨﺪﻡ ﺧﻄﻮﻁ ﻋﺎﻟﻴﺔ ﺍﻟـﺴﺮﻋﺔ ﺗـﺴﻤﻰ ‪Leased Lines‬‬
‫ﻟﺘﺘﻐﻠﺐ ﻋﻠﻲ ﻣﺸﻜﻠﺔ ﺍﻟﺴﺮﻋﺔ ﻟﻜﻨﻬﺎ ﻛﺎﻧﺖ ﺗﺪﻓﻊ ﻣﺒﺎﻟﻎ ﺿﺨﻤﺔ ﻣﻘﺎﺑﻞ ﻫﺬﻩ ﺍﳋﺪﻣﺔ ﻟﺮﺑﻂ ﻧﻘﻄﺘﲔ ﺑﺸﻜﻞ‬
‫ﻣﺘﻮﺍﺻﻞ ﻭﺑﺴﺮﻋﺔ ﻋﺎﻟﻴﺔ ﻭ ﺑﺸﺒﻜﺔ ﺧﺎﺻﺔ ﺁﻣﻨﺔ ﻧﻮﻋﹰﺎ ﻣﺎ‪.‬‬

‫ﻋﻨﺪﻣﺎ ﺍﻧﺘﺸﺮﺕ ﺷﺒﻜﺔ ﺍﻻﻧﺘﺮﻧﺖ ﰲ ﻛﻞ ﻣﻜﺎﻥ‪ ،‬ﻛﺎﻧﺖ ﻫﻨﺎﻙ ﻓﺮﺻﺔ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻛﻮﺳﻴﻂ ﻟﻨﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ‬
‫ﻛﺸﺒﻜﺔ ﳝﻜﻦ ﻣﻦ ﺧﻼﳍﺎ ﻧﻘﻞ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﻣﻜﺎﻥ ﺇﱄ ﺃﺧﺮ ﺑﺄﺳﻌﺎﺭ ﺯﻫﻴﺪﺓ ﻣﻘﺎﺭﻧﺔ ﺑﺎﻟﻄﺮﻳﻘﺔ ﺍﻟﺴﺎﺑﻘﺔ‪ ،‬ﻭﱂ‬
‫ﻉ ﻟﺘﻮﺻﻴﻞ ﻧﻘﻄﻴﺘﲔ ﻣﻊ ﺑﻌﻀﻬﻤﺎ ﻓﻴﻤﻜﻦ ﺍﻻﺗﺼﺎﻝ ﻣﻦ ﺃﻱ ﺟﻬﺎﺯ ﰲ ﺍﻟﻌﺎﱂ ﺑﺄﻱ ﺟﻬﺎﺯ ﰲ ﺍﻟﻌﺎﱂ‬
‫ﻳﻜﻦ ﻫﻨﺎﻙ ﺩﺍ ٍ‬
‫ﺃﻥ ﻛﺎﻧﺎ ﻣﺘﺼﻠﲔ ﺑﺎﻻﻧﺘﺮﻧﺖ‪ ،‬ﻭﺃﻥ ﻛﺎﻧﺖ ﻧﻮﻋﻴﺔ ﺍﻻﺗﺼﺎﻝ ﺑﲔ ﺍﳉﻬﺎﺯﻳﻦ ﻫﻮ ﺇﻝ ‪ ASDL‬ﻓـﺄﻥ ﺍﻟﺘﻜﻠﻔـﺔ‬
‫ﺗﻜﻮﻥ ﺛﺎﺑﺘﺔ ﻭﻣﻨﺎﺳﺒﺔ ﻭﺍﻻﺗﺼﺎﻝ ﻗﺎﺋﻢ ﺑﺸﻜﻞ ﻣﺴﺘﻤﺮ‪.‬‬

‫ﺍﳌﺸﻜﻠﺔ ﰲ ﻫﺬﻩ ﺍﻟﻄﺮﻳﻘﺔ ﻫﻲ ﺃﻥ ﺍﺗﺼﺎﻝ ﺍﳉﻬﺎﺯﻳﻦ ﻋﱪ ﺍﻻﻧﺘﺮﻧﺖ ﻳﻌﺮﺿﻬﻤﺎ ﻣـﻊ ﺍﳌﻌﻠﻮﻣـﺎﺕ ﺍﳋﺎﺻـﺔ‬
‫ﺑﺎﻟﺸﺮﻛﺔ ﺇﱄ ﺍﻻﺧﺘﺮﺍﻕ‪ ،‬ﻭﻫﺬﺍ ﺍﻻﺗﺼﺎﻝ ﻳﻌﺘﱪ ﻏﲑ ﺁﻣﻦ ﻭﻟﻦ ﺗﻘﺒﻞ ﺍﻟﺸﺮﻛﺎﺕ ﻭﺍﳌﺆﺳﺴﺎﺕ ﳌﺎ ﳛﻤﻠﻪ ﻣـﻦ‬
‫ﳐﺎﻃﺮ‪ ،‬ﻓﻜﺎﻥ ﻻﺑﺪ ﻣﻦ ﺃﳚﺎﺩ ﺣﻞ ﳌﺸﻜﻠﺔ ﺍﻷﻣﻦ ﻫﻨﺎ ﻭﳍﺬﺍ ﰎ ﺇﺻﺪﺍﺭ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ‪.‬‬
‫‪www.ITNAT.com‬‬ ‫‪5‬‬ ‫‪[email protected]‬‬

‫ﺍﻟﺸﺒﻜﺔ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ ﺍﳋﺎﺻﺔ‪:‬‬

‫ﺗﻮﻓﺮ ﺍﻷﻣﻦ ﻟﻠﺸﺒﻜﺔ ﺍﳋﺎﺻﺔ ﺑﺎﻹﺿﺎﻓﺔ ﺇﱄ ﺍﻷﺳﻌﺎﺭ ﺍﳌﻨﺎﺳﺒﺔ ﺑﺎﺳﺘﺨﺪﺍﻡ ﺷﺒﻜﺔ ﺍﻻﻧﺘﺮﻧﺖ‪.‬‬
‫ﻫﻨﺎ ﳚﺐ ﻓﺼﻞ ﺍﻟﻄﺮﻓﲔ ﻋﻦ ﺍﻻﻧﺘﺮﻧﺖ ﻣﻦ ﺍﻟﻨﺎﺣﻴﺔ ﺍﻟﻨﻈﺮﻳﺔ‪ ،‬ﻋﻦ ﻃﺮﻳﻖ ﻭﺿﻊ ﺍﻷﺟﻬﺰﺓ ﰲ ﻧﻄـﺎﻕ ﻣﻌـﲔ‬
‫‪ IP‬ﻭﺧﺎﺹ ﻛﺸﺒﻜﺎﺕ ﳏﻠﻴﺔ ﺧﺎﺻﺔ ﺑﻜﻞ ﺟﻬﺔ‪ ،‬ﻭﳚﺐ ﻭﺿﻊ ﺟﺪﺍﺭ ﻧﺎﺭﻱ ‪ Firewall‬ﻟﻠﺠﻬـﺔ‬
‫ﺍﻟﱵ ﺗﺴﺘﺨﺪﻡ ﺍﻻﺗﺼﺎﻝ ﺃﻭ ﻣﻦ ﺍﳌﻨﺘﻈﺮ ﺃﻥ ﻳﺘﻢ ﺍﻻﺗﺼﺎﻝ ﻬﺑﺎ ﻟﻠﻮﺻﻮﻝ ﺇﱄ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﳋﺎﺻﺔ ﻬﺑـﺎ ﻭﻳﻘـﻮﻡ‬
‫ﺍﳉﺪﺍﺭ ﺍﻟﻨﺎﺭﻱ ﺑﺄﺑﻌﺎﺩ ﻣﺘﺼﻔﺤﻲ ﺍﻻﻧﺘﺮﻧﺖ ﻭﻣﻨﻌﻬﻢ ﻣﻦ ﺍﻟﺪﺧﻮﻝ ﺃﻭ ﺍﻟﻮﺻﻮﻝ ﺇﱄ ﺍﻟﺴﲑﻓﺮ ﺍﳋﺎﺹ ﺑﺎﻟﺸﺮﻛﺔ‬
‫ﺃﻻ ﻣﻦ ﺧﻼﻝ ﻛﻤﺒﻴﻮﺗﺮﺍﺕ ﻣﻌﻴﻨﺔ ﲣﺘﺎﺭﻫﺎ ﺍﻟﺸﺮﻛﺔ‪.‬‬

‫ﺍﻟﻔﻜﺮﺓ ﺍﻟﺮﺋﻴﺴﻴﺔ ﰲ ﻣﺴﺄﻟﺔ ﺍﻟﺸﺒﻜﺔ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ ﺍﳋﺎﺻﺔ ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﻨﺎﺀ " ﻧﻔﻖ" ﺧﺎﺹ ﺑﲔ ﺍﳉﻬﺎﺯﻳﻦ ﻛﻤـﺎ‬
‫ﰲ ﺍﻟﺼﻮﺭﺓ‪ ،‬ﺍﻟﻨﻔﻖ ﺃﻭ ﺇﻝ ‪ VPN Tunnel‬ﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﻣﻌﻠﻮﻣﺎﺕ ﺧﺎﺻﺔ ﻭﻣﺸﻔﺮﺓ ﻳﺘﻢ ﺗﺒﺎﺩﳍﺎ ﺑﲔ‬
‫ﺍﳉﻬﺎﺯﻳﻦ ﺍﻟﻠﺬﺍﻥ ﻳﻘﻮﻣﺎﻥ ﺑﻔﻚ ﺍﻟﺘﺸﻔﲑ ﻋﻨﺪ ﺍﺳﺘﻼﻡ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﺍﻟﻄﺮﻑ ﺍﻵﺧﺮ ﻣﻦ ﺍﻟﻨﻔﻖ ﺍﻻﻓﺘﺮﺍﺿـﻲ‬
‫ﺑﻌﺪ ﺃﻥ ﻳﺒﻌﺪ ﺍﳉﺪﺍﺭ ﺍﻟﻨﺎﺭﻱ ﺃﻱ ﺍﺗﺼﺎﻝ ﻏﲑ ﻣﺮﺧﺺ ﻟﻪ ﻣﻦ ﻣﺪﻳﺮ ﺍﻟﻨﻈﺎﻡ ﺃﻭ ﺍﳌﺴﺌﻮﻝ ﻋـﻦ ﺍﻟـﺸﺒﻜﺔ ﰲ‬
‫ﺍﻟﺸﺮﻛﺔ ﺃﻭ ﻓﺮﻋﻬﺎ‪.‬‬

‫ﺍﻟﻔﻜﺮﺓ ﻫﻲ ﲪﺎﻳﺔ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻣﻦ ﺧﻼﻝ ﺍﻟﻨﻔﻖ ﺍﳌﺸﻔﺮ ﻟﻠﺒﻴﺎﻧﺎﺕ ﻭﺃﻳﻀﹰﺎ ﻣﻦ ﻫﻮﻳﺔ ﺍﳉﻬﺎﺯ ﺍﳌﺘﺼﻞ ﻣﻦ ﺧﻼﻝ‬
‫ﺍﳉﺪﺍﺭ ﺍﻟﻨﺎﺭﻱ ﺍﻟﺬﻱ ﻟﻦ ﻗﺒﻞ ﺇﻱ ﺍﺗﺼﺎﻝ ﻏﺮﻳﺐ‪.‬‬
‫‪www.ITNAT.com‬‬ ‫‪6‬‬ ‫‪[email protected]‬‬

‫ﺍﻟﺼﻮﺭﺓ ﺍﻟﺘﺎﻟﻴﺔ ﺗﺒﲔ ﺍﺗﺼﺎﻝ ﺑﻌﺾ ﺍﻷﺟﻬﺰﺓ ﻣﻊ ﺑﻌﻀﻬﺎ ﻣﻦ ﺧﻼﻝ ﺷﺒﻜﺔ ﺍﻓﺘﺮﺍﺿﻴﺔ ﺧﺎﺻﺔ‪:‬‬

‫ﺃﻥ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺸﺒﻜﺔ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ ﺍﳋﺎﺻﺔ ﻟﻦ ﺗﻜﻮﻥ ﻣﻌﻘﺪﺓ ﻟﻠﻤﺴﺘﺨﺪﻡ ﺍﻟﻌﺎﺩﻱ ﻓﻬﻮ ﻟـﻦ ﻳـﺮﻯ ﺳـﻮﻯ‬
‫ﺍﺠﻤﻟﻠﺪﺍﺕ ﺍﳋﺎﺻﺔ ﺑﻊ ﻋﻠﻲ ﺍﻟﺴﲑﻓﺮ ﺍﳋﺎﺹ‪.‬‬
‫‪www.ITNAT.com‬‬ ‫‪7‬‬ ‫‪[email protected]‬‬

‫ﻋﻠﻲ ﺳﺒﻴﻞ ﺍﳌﺜﺎﻝ ﺍﻟﺼﻮﺭﺓ ﺍﻟﺘﺎﻟﻴﺔ ﻫﻲ ﺠﻤﻟﻠﺪ ﻋﻠﻲ ﺍﻟﺴﲑﻓﺮ‪:‬‬

‫ﻛﻤﺎ ﳝﻜﻦ ﺭﺑﻂ ﻓﺮﻭﻉ ﻋﺪﻳﺪﺓ ﻣﻊ ﺍﳌﻘﺮ ﺍﻟﺮﺋﻴﺴﻲ ﺑﺎﻟﺸﺮﻛﺔ ﻭﳝﻜﻦ ﻣﺮﺍﻗﺒﺔ ﻧﻘﺎﻁ ﺍﻻﺗﺼﺎﻝ ﻭﻛﻤﻴﺔ ﺍﻟﺒﻴﺎﻧﺎﺕ‬
‫ﺍﻟﱵ ﰎ ﲤﺮﻳﺮﻫﺎ ﻣﻊ ﺍﳌﺪﺓ ﺍﻟﺰﻣﻨﻴﺔ ﺍﻻﺗﺼﺎﻝ ﻛﻤﺎ ﺑﺎﻟﺼﻮﺭﺓ ﺍﻟﺘﺎﻟﻴﺔ‪:‬‬

‫ﻫﺬﺍ ﺑﺎﺧﺘﺼﺎﺭ ﻋﻤﻞ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻻﻓﺘﺮﺍﺿﻴﺔ ﺍﳋﺎﺻﺔ ﻭﻓﺎﺋﺪﻬﺗﺎ ﻟﻠﻨﺎﺱ ﻭﺍﻟﺸﺮﻛﺎﺕ ﺑﺸﻜﻞ ﺧﺎﺹ‪.‬‬
www.ITNAT.com 8 [email protected]

.‫ ﺧﻄﻮﺓ ﺧﻄﻮﺓ ﺃﻥ ﺷﺎﺀ ﺍﷲ‬VPN ‫ﺷﺮﺡ ﻃﺮﻳﻘﺔ ﻋﻤﻞ ﺍﺗﺼﺎﻝ‬


www.ITNAT.com 9 [email protected]
www.ITNAT.com 10 [email protected]
‫‪www.ITNAT.com‬‬ ‫‪11‬‬ ‫‪[email protected]‬‬

‫ﺇﱃ ﺍﻟﻠﻘﺎﺀ ﰲ ﺍﳌﺸﺎﺭﻛﺔ ﺍﻟﻘﺎﺩﻣﺔ ﺇﻥ ﺷﺎﺀ ﺍﷲ ‪.‬‬

‫ﺧﲑ ﺍﻟﻜﻼﻡ‪-:‬‬

‫ﻳﻘﻮﻝ ﺗﻌﺎﱃ ) ﺍﻗﺮﺃ ﺑﺎﺳﻢ ﺭﺑﻚ ﺍﻟﺬﻱ ﺧﻠﻖ * ﺧﻠﻖ ﺍﻹﻧﺴﺎﻥ ﻣﻦ ﻋﻠﻖ * ﺃﻗﺮﺍ ﻭﺭﺑﻚ ﺍﻷﻛﺮﻡ *ﺍﻟﺬﻱ ﻋﻠﻢ ﺑﺎﻟﻘﻠﻢ * ﻋﻠﻢ‬
‫ﺍﻹﻧﺴﺎﻥ ﻣﺎ ﱂ ﻳﻌﻠﻢ (‬

‫‪Hack_1Killer‬‬ ‫ﺃﺧﻮﻛﻢ ‪/‬‬

‫ﻟﻠﻤﺮﺍﺳﻠﺔ ‪[email protected]‬‬
‫ﻟﻠﻤﺮﺍﺳﻠﺔ ‪[email protected]‬‬

You might also like