VPN protocols available

9:29:00 PM
VPN protocols available

- VPN protocols available

VPN

First, what is actually a VPN ? "VPN" stands for "Virtual Private Network". Simply put, a VPN is a type of connection that uses a public network (like the Internet) to create a secure network that the sites can connect to private use. You can read a guide on VPN bases here.

Protocols

VPN can be understood by the types of protocols they use to traffic the tunnel from various sites in the virtual network. There are a number of different protocols available, and each one is slightly different from the way it processes data it processes and how it makes these secure data. These protocols include:

  • IPSec (IP Security) IPSec is used to transfer calls safely .. IPSec encrypts data in one of two ways: first, by transport mode IPSec does not encrypt the entire data packet (data traffic via a VPN), but only the message that is communicated in this package. Alternatively, IPsec encrypts tunneling which encrypts the whole data packet.

  • Sockets Layer (SSL) and Transport Layer Security (TLS). as IPSec, SSL and TLS secure communications across a VPN. The difference is that your use cryptography to. Specifically, the use of a process which is known as a "handshake". It is named as such because the protocol involves the remote client and the server to perform a kind of virtual trading to determine if the remote client is authorized to access the VPN. This "handshake" using encrypted certificates that are stored on both the client and server systems. When they match, the client is deemed authentic.

  • Point-to-Point Tunneling Protocol (PPTP) . This uses the Internet to connect a remote client to a private server. It is simple in terms of maintenance, and do implement.

  • Layer 2 Tunneling Protocol (L2TP). An L2TP is a protocol used for data communication tunnel between two Internet sites. This protocol is often used alongside IPSec to increase the security of data transferred. Most importantly, L2TP depends on clients and servers using certificates or a shared key for authentication.

For more information on protocols and all things VPN, visit HideMyAss by clicking the button below:

vpn website

Previous
Next Post »
0 Komentar