SSH is often referred to as 'the poor man's VPN' or 'the VPN that no-one remembers' but both are still widely used today and have their advantages and similarities. In this
A simple analogy of VPN (Virtual Private Network) vs SSH (Secure Shell) would be as follows: you are having a telephone conversation from home with your colleagues in a board room elsewhere. With a VPN everybody in the board room is able to hear you and you can hear them but with an SSH only a single person can hear you and they have to forward the message to everybody else. What we are saying is a VPN connects you to a network and SSH to a single computer.
As their names would suggest both VPN and SSH are both used to 'tunnel' network traffic using an encrypted connection and thereby providing you with extra security. For this
There are two different cases of using VPNs and SSH - internal and external - and both of these will be explored. What we mean by internal is running your own VPN/SSH server and by external is when you connect to a remote service as provided by your company for home working or by a VPN provider for security.
The main difference between SSH and VPN is that VPN works on the transport level while SSH works on an application level. This means that when you install a VPN it automatically routes all your network traffic through a secure tunnel and this is why when you install a VPN software it will also install a virtual network adapter.
On a security level both can be used to provide exactly the same amount of encryption and from this point of
Though VPN is generally easier to set up the problem is that there is no one unified standard for it. This means that the level of support can vary and you might have problems with setting it up.
Pros: Can use UDP or TCP, can disguise traffic
Cons: no unified standard
Uses: Remote access to company resources, providing security
As mentioned above SSH works on an application level. This means that it needs to be configured manually in order to protect all your traffic. Therefore if you wish to set-up encryption for all your software it needs to be manually configured using your SSH client - usually PuTTY.
As mentioned above SSH is easy to install but it can be hard to set-up. This is because you need to configure all connections individually and need to set your browsers to use a SOCKS proxy. SSH
Pros: doesn't encrypt all your traffic, cheaper to run, single standardized & unified protocol
Cons: Harder to set up, can only use TCP, doesn't encrypt all your traffic, hard to disguise traffic, DNS leaks
Uses: remote access to a single computer, providing security
We recently reviewed