Professional Documents
Culture Documents
VPN Technology
VPN Technology
Hetal Presswala
2 - Confidential
Types of VPN
3 - Confidential
IPSec Vs SSL VPN
IPSec
Increase Administrative cost
IP enable service
Moderate secure
Client side scalability issue
Application response is fast
SSL
Clientless access
Web enable service
Highly secure
Scalable
Application response is moderate
4 - Confidential
VPN on Private network
Packet travels between offices using given below
methodology
L2TP (Layer 2 Tunneling Protocol)
PPTP (Point to Point Tunneling Protocol)
GRE (Generic Routing Encapsulation)
MPLS Tunnel (Multi Packet label switching)
5 - Confidential
L2TP
Layer 2 remote access VPN protocol
Combines and extends PPTP and L2F (Cisco
supported protocol)
Weak authentication and encryption
Does not include packet authentication, data
integrity, or key management
6 - Confidential
PPTP
Layer 2 remote access VPN distributed with
Windows product family
Addition to Point-to-Point Protocol (PPP)
Allows multiple Layer 3 Protocols
Uses proprietary authentication and encryption
Limited user management and scalability
7 - Confidential
GRE
Unencrypted tunnel
Provide virtual connection
Does not include packet authentication
8 - Confidential
MPLS Tunnel
Unencrypted tunnel
Virtual Private Wire Services (VPWS) the CE sees
one or more point-to-point connections, similar to
a leased line or ATM virtual
Virtual Private LAN Services (VPLS), the CE
connects to a private layer 2 switch
Layer-3 VPN (including BGP/MPLS VPN), the CE
connects to a private layer 3 router
9 - Confidential
VPN Advantages
Increase productivity
Flexible working Hours
Scalable infrastructure
Centralized security and access control
Infrastructure cost reduction
10 - Confidential