13. Virtual Private Networks
0
0
173 Views·
10 September 2023
In
Tutorials
Part 13 of Computer Networking Fundamentals: Virtual Private Networks (VPN)
Virtual Private Networks
At the end of this episode, I will be able to:
- Identify and describe the characteristics and importance of VPNs.
Learner Objective: Identify and describe the characteristics and importance of VPNs
Description: In this episode, the learner will be introduced to virtual private networks or VPNs as well as the importance and attributes of this technology.
- Introduction to Network Infrastructure
- Virtual Private Networks
- A technology that allows for secure communications using public networks infrastructure
- Tunneling Protocols -
- Protocol - a set of rules for communications on a network
- Point-to-Point Tunneling Protocol (PPTP) - the oldest VPN tunneling protocol, while still in use, should be avoided due to vulnerabilities in the encryption and authentication.
- Layer 2 Tunneling Protocol (L2TP)- a combination of Microsoft's PPTP and Cisco's Layer 2 Forwarding (L2F), is a complex VPN protocol that is commonly coupled with IPSec for strong encryption.
- Microsoft Point-to-Point Encryption (MPPE)- an older encryption protocol used with dial-up connections and VPN technologies. This protocol is not considered to be secure and should be avoided where security is a concern.
- IP Security (IPSec)
- VPN Types
- Remote Access VPN - connects remote users to the organization's network from any location
- Site-to-site VPN - connects two local area networks together
- Virtual Private Networks
Show more
0 Comments
sort Sort By