About our VPN Technology

At Impulse Computer Services we use some of the world's most advanced VPN software that is easy-to-use, multi-protocol and cross-platform. Our VPN software runs on Windows, Linux, Mac, FreeBSD and Solaris.

It has strong resistance against over secure firewalls to minimize threats. Built-in NAT-traversal penetrates troublesome firewalls for overprotection. We have strategically placed VPN servers in Germany, England and the USA which are used to establish the VPN connection and act as intermediary server if needed.

Any deep-packet inspection firewalls cannot detect our VPN's transport packets as a VPN tunnel, because it is possible to use Ethernet over HTTPS for camouflage if required. VPNs allows you to share surveillance systems, provide remote support and interlink private networks with an extremely secure connection.

What is a VPN

Virtual private networks (VPNs) extend private networks across public networks and enable users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. ("In the simplest terms a VPN creates a secure, encrypted connection, which can be thought of as a tunnel, between your computer and another using the same service."). Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network.

A VPN is created by establishing a virtual point-to-point connection using dedicated connections, virtual tunnelling protocols, and traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.

Traditional VPNs are characterized by a point-to-point topology, and they tend not to support or connect broadcast domains, so services such as Microsoft Windows NetBIOS may not be fully supported or work as they would on a local area network (LAN). Designers have developed VPN variants, such as Virtual Private LAN Service (VPLS), and layer-2 tunnelling protocols, to overcome this limitation. Our VPN service does include layer-2 tunneling.

Why use a VPN

VPNs may allow users to securely access a corporate intranet while located outside the office. They are used to securely connect geographically separated offices of an organization, creating one cohesive network. While the public world wide web can usually be spanned using static public IP addresses and routing, such systems can be costly and pose a significant securiy threat. VPNs are a much more flexible and elegant solution because all that is required is appropriate Internet access and a stable VPN server. The biggest advantage is that connections are free of tampering by hackers since all traffic is run over as securely encrypted connection.

Virtual hubs separated our clients from each other and therefore each of our clients can enjoy a highly secure VPN environment which is tamper proof. Since inception of our services, our servers have never been breached. The public Internet is a notorious dangerous place since crackers are busy all the time trying to hack their way into systems using brute force techniques.

VPN Features

  • Easy to establish both remote-access and site-to-site VPN
  • SSL-VPN Tunneling on HTTPS to pass through NATs and firewalls
  • Revolutionary VPN over ICMP and VPN over DNS features
  • Resistance to highly-restricted firewall
  • Ethernet-bridging (L2) and IP-routing (L3) over VPN
  • Embedded dynamic-DNS and NAT-traversal so that no static nor fixed IP address is required
  • AES 256-bit and RSA 4096-bit encryptions
  • Sufficient security features such as logging and firewall inner VPN tunnel.
  • 1Gbps-class high-speed throughput performance with low memory and CPU usage
  • Windows, Linux, Mac, Android, iPhone, iPad and Windows Mobile are supported
  • SSL-VPN (HTTPS) and 6 major VPN protocols (OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP) are all supported as VPN tunneling underlay protocols
  • The OpenVPN clone function supports legacy OpenVPN clients
  • IPv4 / IPv6 dual-stack.
  • The VPN server runs on Windows, Linux, FreeBSD, Solaris and Mac OS X.
  • Configure All settings on GUI.
  • Multi-languages (English, Japanese and Simplified-Chinese).
  • No memory leaks. High quality stable codes, intended for long-term runs.
  • RADIUS / NT Domain user authentication function
  • RSA certificate authentication function
  • Deep-inspect packet logging function
  • Source IP address control list function
  • syslog transfer function