All you need to know about VPN tunnel

6:50:00 PM
All you need to know about VPN tunnel -

Everything you need to know about VPN tunnel

VPN technology is derived from the principle of tunneling . A valid network connection can be established and maintained with VPN tunnel support. This connection built packets using a particular protocol VPN. Then, the packets are encapsulated in a carrier protocol. they are then transmitted between the client and the server. At the receiving end the packets are decapsulated. In case of virtual private networks based on Internet, the Internet Protocol packets are used for packet encapsulation (after any one of VPN protocols). To keep the VPN tunnel protocols safe and secure support encryption and authentication.

VPN tunneling types

Two types of tunneling technology commonly used by VPN tunneling are voluntary and compulsory tunneling.

the connection configuration is managed by the voluntary VPN tunneling client. Initially, a connection is made by the customer to the operator's network provider. For VPN Internet, the client connects with an ISP. Then the tunnel to the VPN server is created by the client application on the live connection.

The connection setup is handled by the operator's network provider in the compulsory tunnel. When a connection is established with the support for the first time by the customer, the carrier holds a VPN connection between the VPN server and client. compulsory tunneling associates customers with specific servers using the logic that exists within the available device. The network device is known as Network Access Server or NAS as well as Front End Processor or FEP. Details on the connectivity of servers are hidden from customers compulsory tunneling. Management control is transferred from the customer to the ISP by compulsory tunneling mechanism. The installation and maintenance of VET provision are performed by service providers.

VPN tunneling protocols

Different types of network protocols are put into service for use with VPN tunnels. Common VPN tunneling protocols listed below:

point-to-point tunneling protocol or PPTP : multiprotocol traffic is encapsulated in the IP header after being encrypted, then the send through the IP network using PPTP. Site-to-site VPN connections and remote access are achieved by using PPTP. PPP frames, found in IP datagrams are encapsulated by PPTP to send over the network. For the management of the tunnel encapsulation and PPP frames, a TCP connection and a customized Generic Routing Encapsulation is used by PPTP. Handle PPP frames (which are encapsulated) can be compressed or encrypted

Layer2 Tunneling Protocol or L2TP :. L2TP allows encryption and transfer of multiprotocol traffic from any network that can support PPTP. A combination L2F (Layer 2 Forwarding) and PPTP is L2TP. The best characteristics of both are incorporated in L2TP. L2TP name is derived from the fact that it is a layer 2 (data link layer) in the OSI model

SecureSocket Tunneling Protocol or SSTP :. This Protocol is a new protocol that uses HTTPS TCP port 443. This protocol can pass traffic through a Web proxy and firewall blocking L2TP / IPSec and PPTP traffic. Security at transport level is provided by Secure Sockets Layer with the help of advanced integrity checking, encryption key a nd negotiations.

vpn website

Previous
Next Post »
0 Komentar