Overview
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHORS
-
Mohammed ACHEMLAL: Head of R&D Unit "Intranet Security Services" FTR&D/DMI/SIR
-
Michel DUDET: Head of Programs and Operations FTR&D/DMI
INTRODUCTION
This article describes the technologies used to build virtual private networks (VPNs). A classification of VPNs is proposed, identifying those that require interaction with a telecom operator's network and those that can be built independently of the transport network.
The article focuses on the main technologies operating at Layer 2 or Layer 3 of the OSI model: IPSec, L2TP, GRE and MPLS. The architectures and services associated with these architectures are also analyzed.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
VPN technologies
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!