Cameroon Finance

Sep 18 2018

What is virtual private network (VPN)? Definition from, mpls vpn ppt.#Mpls #vpn #ppt


#

virtual private network (VPN)

Mpls vpn ppt

  • Share this item with your network:

A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet. VPN technology was developed as a way to allow remote users and branch offices to securely access corporate applications and other resources. To ensure safety, data travels through secure tunnels and VPN users must use authentication methods — including passwords, tokens and other unique identification methods — to gain access to the VPN.

Mpls vpn ppt

Mpls vpn ppt Mpls vpn ppt

Download Now: Network Management Monitoring Tools Reviewed By Your Peers

Quickly cut through the hype! In this exclusive 28-page guide, we provide an overview of essential network monitoring features, advice on building your business case and selecting the best monitoring tool for your network. Plus, see 4 popular network management and monitoring tools from CA, HP, and LANDesk to help you make your decision.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Pros and cons of using a VPN

The benefit of using a secure VPN is it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. The justification for using VPN access instead of a private network usually boils down to cost and feasibility: It is either not feasible to have a private network — e.g., for a traveling sales rep — or it is too costly to do so.

VPN performance can be affected by a variety of factors, among them the speed of users’ internet connections, the types of protocols an internet service provider may use and the type of encryption the VPN uses. Performance can also be affected by poor quality of service and conditions that are outside the control of IT.

VPN protocols

There are several different protocols used to secure and encrypt users and corporate data:

IP security (IPsec)

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

Point-To-Point Tunneling Protocol (PPTP)

Layer 2 Tunneling Protocol (L2TP)

The most common types of VPNs are remote-access VPNs and site-to-site VPNs.

Remote-access VPN

A remote-access VPN uses a public telecommunication infrastructure like the internet to provide remote users secure access to their organization’s network. This is especially important when employees are using a public Wi-Fi hotspot or other avenues to use the internet and connect into their corporate network. A VPN client on the remote user’s computer or mobile device connects to a VPN gateway on the organization’s network. The gateway typically requires the device to authenticate its identity. Then, it creates a network link back to the device that allows it to reach internal network resources — e.g., file servers, printers and intranets — as though it was on that network locally.

A remote-access VPN usually relies on either IPsec or Secure Sockets Layer (SSL) to secure the connection, although SSL VPNs are often focused on supplying secure access to a single application, rather than to the entire internal network. Some VPNs provide Layer 2 access to the target network; these require a tunneling protocol like PPTP or L2TP running across the base IPsec connection.

Mpls vpn ppt

Site-to-site VPN

A site-to-site VPN uses a gateway device to connect the entire network in one location to the network in another — usually a small branch connecting to a data center. End-node devices in the remote location do not need VPN clients because the gateway handles the connection. Most site-to-site VPNs connecting over the internet use IPsec. It is also common to use carrier MPLS clouds, rather than the public internet, as the transport for site-to-site VPNs. Here, too, it is possible to have either Layer 3 connectivity (MPLS IP VPN) or Layer 2 (Virtual Private LAN Service, or VPLS) running across the base transport.

VPNs can also be defined between specific computers, typically servers in separate data centers, when security requirements for their exchanges exceed what the enterprise network can deliver. Increasingly, enterprises also use VPN connections in either remote-access mode or site-to-site mode to connect — or connect to — resources in a public infrastructure-as-a-service environment. Newer hybrid-access scenarios put the VPN gateway itself in the cloud, with a secure link from the cloud service provider into the internal network.

Next Steps

Expert Karen Scarfone provides an in-depth overview explaining how SSL VPNs work and provides a comparison of the top SSL VPN products on the market.

Find out how the security features of SSL VPN products may benefit your organization and read advice about how to choose the right SSL VPN for your company.

Continue Reading About virtual private network (VPN)

Related Terms

Content

Find more PRO+ content and other member only offers, here.


Written by admin


Leave a Reply

Your email address will not be published. Required fields are marked *