1 / 10

VPN Protocol

VPN Protocol. VPN. VPN. What is a VPN?. A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and encryption to protect data integrity and confidentiality. Internet. VPN Protocol.

simeon
Download Presentation

VPN Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VPN Protocol

  2. VPN VPN What is a VPN? • A VPN is A network that uses Internet or other network service to transmit data. • A VPN includes authentication and encryption to protect data integrity and confidentiality Internet

  3. VPN Protocol • Virtual private network (VPN) protocols are a group of transmission control protocol/internet protocols (TCP/IPs) that enable the safe transfer of data over the Internet. A VPN is a network of computers that allows its users to connect to the Internet. • protocol is a set of standardized rules that determines error detection methods, data authentication, signaling and representation of data over a communications channel---the medium used for the transfer of data from the sender to the receiver. Its purpose is to ensure a reliable channel for the exchange of data.

  4. PPTP • PPTP (Point to Point Tunneling Protocol) is a good, lightweight VPN protocol offering basic online security with fast speeds. PPTP is built-in to a wide array of desktop and mobile devices and features 128-bit encryption. PPTP is a good choice if OpenVPN isn't available on your device and speed is top priority.

  5. Internet Point-to-Point Tunneling Protocol (PPTP) • Layer 2 remote access VPN distributed with Windows product family • Addition to Point-to-Point Protocol (PPP) • Allows multiple Layer 3 Protocols • Uses proprietary authentication and encryption • Limited user management and scalability • Used MPPE encryption method Corporate Network Remote PPTP Client PPTP RAS Server ISP Remote Access Switch

  6. L2TP/IPsec • L2TP (Layer 2 Tunneling Protocol) with IPsec (IP Security) is a very secure protocol built-in to a wide array of desktop and mobile devices. • L2TP/IPsec features 256-bit encryption, but the extra security overhead requires more CPU usage than PPTP. L2TP/IPsec is an excellent choice if OpenVPN is not available on your device, but you want more security than PPTP.

  7. Internet Layer 2 Tunneling Protocol (L2TP) • Layer 2 remote access VPN protocol • Combines and extends PPTP and L2F (Cisco supported protocol) • Weak authentication and encryption • Addition to Point-to-Point Protocol (PPP) • Must be combined with IPSec for enterprise-level security Corporate Network Remote L2TP Client L2TP Server ISP L2TP Concentrator

  8. Internet Protocol Security (IPSec) • Layer 3 protocol for remote access, intranet, and extranet VPNs • Internet standard for VPNs • Provides flexible encryption and message authentication/integrity

  9. OpenVPN • OpenVPN is the premier VPN protocol designed for modern broadband networks, but is not supported by mobile devices and tablets. OpenVPN features 256-bit encryption and is extremely stable and fast over networks with long distances and high latency. It provides greater security than PPTP and requires less CPU usage than L2TP/IPsec. OpenVPN is the recommended protocol for desktops, including Windows, Mac OS X, and Linux.

  10. Thanks for your attention

More Related