Secure VPN Protocols - PowerPoint PPT Presentation

About This Presentation
Title:

Secure VPN Protocols

Description:

A VPN is the process of creating the safe and secure connection to and from the computer or the network. In other words, VPN is the virtual private network which allows the users to connect with the private network over the Internet for accessing the data privately and securely. Secure VPN protocols creates the encryption which is known as VPN tunnel. – PowerPoint PPT presentation

Number of Views:244

less

Transcript and Presenter's Notes

Title: Secure VPN Protocols


1
Secure VPN Protocols
http//bestvpnfinder.com/
2
Presentation overview
Secure VPN Protocols Types of Virtual Private
Network (VPN) Remote Access VPN Site to Site
VPN Types of more secure protocols Point to Point
Tunneling Protocol (PPTP) Layer 2 Tunneling
Protocol (L2TP) Internet Protocol Security or
IPSec Secure Sockets Layer (SSL) Open
Vpn Multi-Protocol Label Switching (MPLS)
3
Secure VPN Protocols
A VPN is the process of creating the safe and
secure connection to and from the computer or
the network. In other words, VPN is the virtual
private network which allows the users to
connect with the private network over the
Internet for accessing the data privately and
securely. Secure VPN protocols creates the
encryption which is known as VPN tunnel. All the
communication and internet traffic is passed
through this secure VPN tunnel which plays a
vital role and used to keep the user's data more
safe and secure
4
  • Types of Virtual Private Network

Remote Access VPN Site to Site VPN
5
Remote Access VPN
This kind of VPN permits the users to connect to
the private network for accessing its resources
and services remotely. The connection between
the private network and the user happens via the
internet, but the connection is more safe and
secure. This Remote access VPN is perfectly
suitable for home based users as well as the
business users.
6
Site to Site VPN
The Site to Site VPN is also known as Router to
Router VPN which is commonly used by corporate
companies. If a company has many branch offices
in different geographical locations, they use
the site to site VPN which connects the networks
of two offices at various places. This site to
site VPN type is called as the intranet based
VPN when different branches of the same company
are connected by using the site to site VPN.
7
Types of more secure protocols
Point to Point Tunneling Protocol (PPTP) Layer 2
Tunneling Protocol (L2TP) Internet Protocol
Security or IPSec Secure Sockets Layer (SSL)
8
secure protocols
POINT TO POINT TUNNELING PROTOCOL (PPTP) PPTP is
one of the popular and widely used protocols.
Since the period of Windows 95, this PPTP
protocol has been in use. Alongside Windows, the
Point to Point Tunneling Protocol supports the
Mac and Linux operating system. It enables the
authorized remote users for connecting to the
VPN network with the help of existing internet
connection.
9
  • Layer 2 Tunneling Protocol (L2TP)

The Layer 2 Tunneling Protocol is a type of
tunneling protocol and is typical combines with
another secure VPN protocols named as IPSec.
This combination is performed to create the
highly secured VPN connection. The L2TP protocol
is used to create the tunnel between the two
contact points whereas the IPSec protocol is
used to encrypt the data and also to handle
secure connection between the tunnel points.
10
INTERNET PROTOCOL
SECURITY OR IPSEC
The Internet Protocol Security is used to provide
secure Internet communication across the IP
network. The IPSec authenticates the session and
encrypts the data packet to protect the internet
protocol communication. Typically the IPSec is
operating in two modes such as tunneling mode
and transport mode for defending data transfer
between two different networks. This protocol
requires expensive and time- consuming client
installations which are considered as the main
disadvantage.
11
Secure Sockets Layer (SSL)
SSL is a VPN accessible through HTTP over the
web browser. This protocol creates the secure
connection between your PC browser and the
application server that you are accessing. The
SSL protocol uses the internet browser as the
client application, so the users need no to
install any software.
12
Open Vpn
Open VPN is the open source VPN which is useful
to create the site to site and point to point
connections. Open VPN uses the custom security
protocol which is based on Sockets Layer
protocol and Transport Layer Security. Moreover,
it is more stable as well as reliable on Wi-Fi
hotspots, non-reliable networks. It is the best
performing protocol with high speed even on
connections with high latency.
13
Multi-Protocol Label Switching
MPLS protocol is not suitable for individual
users to access it remotely. But this protocol
is useful for the site to site connectivity. The
MPLS network offers high-speed as well it
shaping the network traffic flows. This protocol
allows the data packets to the switching level
(Level 2) rather than forwarding it to the
routing level (Level 3).
14
linkable link
_at_bestvpnfinder
_at_bestvpnfinder
bestvpnfinder
Secure VPN Protocols -Which Is The Best Vpn
Protocol?
15
linkable link
MANY THANKS
http//bestvpnfinder.com/
Write a Comment
User Comments (0)
About PowerShow.com