The existing network infrastructure of the corporation may be prepared to use VPN like https://addons.mozilla.org/en-US/firefox/addon/veepn-free-fast-security-vpn/ with the help of the software , so and with the help of hardware maintenance .... Organization of virtual private network can be compared with the laying of the cable through a global network . As a rule , connection between the remote user and the terminal device of the tunnel is established by protocol PPP.
The most common method for creating a tunnel the VPN - encapsulation of network protocols (the IP, the IPX, the AppleTalk and t .d . ) In PPP and Later Click th encapsulation formed packets in the protocol tunneling . Typically, in a last acts IP or (much less likely ) the ATM and the Frame Relay. Such an approach is called tunneling of the second level , as "a passenger" here is the protocol exactly Mo orogo level .
An alternative approach - Encapsulation packet network protocol directly to proto count tunneling ( e.g. , VTP) is called tunneling of the third level .
Regardless of the fact , what protocols are used or what purpose are pursued when organizing a tunnel , the basic technique remains practically unchanged . Typically, one protocol is used for establishing connections with the remote node , and the other - to encapsulate the data and overhead information with the purpose of transmission via the tunnel .
Classification of VPN networks
VPN solutions can be classified according to several main parameters :
By the type of environment used :
Secure VPN networks . The most common variant of private private set th . With its help, it is possible to create a reliable and secure subnet based on an unreliable network , usually the Internet . Examples of secure VPNs are : IPSec, OpenVPN, and PPTP.
Trusted VPN networks . Used in cases where the transmission medium may be counting be reliable and it is necessary to solve a problem of creating a virtual subnet in the framework of a greater network . Questions ensure safety becomes irrelevant . Examples of such VPN solutions are : MPLS and L2TP . Correct to say that these protocols pereklady vayut task of ensuring security on the other , such as the L2TP, as a rule , used in a pair with IPSec.
L'assurance qualité est la priorité absolue des conditions d'utilisation et des directives d'évaluation de ProvenExpert.
Toutefois, si vous estimez qu'un examen est en violation de nos directives, vous pouvez soumettre une demande pour que l'examen soit évalué par l'équipe d'assurance qualité de ProvenExpert en utilisant le formulaire de contact suivant.
Envoyer un courriel à l'examinateur
* Champs obligatoires
Vous avez déjà publié cet avis sur . Le poster à nouveau pourrait créer une duplication. Continuer ?