Various protocols of VPN

Various protocols of VPN

Abstract Tunnels in VPNs are formed by tunneling protocols. There are three main types of tunneling protocols used in VPNs: Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP) and IPSec.
Content Tunnels in VPNs are formed by tunneling protocols. There are three main types of tunneling protocols used in VPNs: Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and IPSec.

PPTP encapsulates user information contained in PPP data packets and supports tunnel switching. Tunnel switching can open and allocate new tunnels according to user rights, and transmit PPP packets on the network. In addition, tunnel switching can also direct users to designated internal servers of the enterprise. PPTP facilitates enterprises to implement access control on firewalls and internal servers. The tunnel terminator located in the corporate firewall accepts PPP data packets containing user information, and then implements access control on data packets from different sources.

The L2TP protocol combines the advantages of the PPTP protocol and the L2F (Layer 2 Forwarding) protocol, and supports multiple tunnels, which allows users to access the Internet and the corporate network at the same time.

IPSec is a standard protocol used to enhance VPN security. IPSec includes content such as user authentication, verification and data integrity. The protocol standard is formulated by the IETF organization, which specifies a series of IP-level protocols used for encryption and digital signature between two IP workstations. IPSec enables devices from different vendors to interoperate during tunnel opening and termination. In addition, because the security function of IPSec is loosely coupled with the key management system, when the key management system changes, the security mechanism of IPsec does not need to be modified.

MPLS-based VPN is a new type of network-based VPN solution. It requires the wide area network to support MPLS and uses MPLS label switching to provide virtual connections for VPN users on the wide area network. The advantage of MPLS VPN is that the ability to manage the entire network is very strong. Because MPLS VPN is based on the network, all VPN network configuration and VPN policy configuration are completed on the network side, which can greatly reduce management and maintenance overhead.

The network-based IP VPN draft formed by ITU-T puts forward the technical requirements for MPLS-based IP VPN. IP technology is used in the service provider's network, and the backbone network uses MPLS. For IP VPN services, it can only be provided on edge devices. And for the backbone equipment, IP / VPN services are transparent, so that it is conducive to scalability.

PA SPEAKER

High Performance Speakers,Premium Universal Speaker Speaker,Professional Steel Speaker Horn,New Excellence Speaker Speaker

NINGBO RFUN AUDIO TECHNOLOGY CO.,LTD , https://www.mosensound.com

Posted on