Overview
ABSTRACT
This article discusses the technologies used to construct Virtual Private Networks (VPNs). It distinguishes between VPNs that require interaction with a telecommunications network and those that can operate independently of the transport network. The main technologies covered are IPSec, L2TP, GRE, and MPLS, operating at layers 2 and 3 of the OSI model. The article analyzes the architectures and services associated with these technologies, as well as their applications, such as the interconnection of corporate sites via the Internet or operator networks, secure access for teleworkers, and the management of quality of service and data flow security.
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHORS
-
Mohammed ACHEMLAL: Head of R&D Unit "Intranet Security Services" FTR&D/DMI/SIR
-
Michel DUDET: Head of Programs and Operations FTR&D/DMI
INTRODUCTION
This article describes the technologies used to build virtual private networks (VPNs). A classification of VPNs is proposed, identifying those that require interaction with a telecom operator's network and those that can be built independently of the transport network.
The article focuses on the main technologies operating at Layer 2 or Layer 3 of the OSI model: IPSec, L2TP, GRE and MPLS. The architectures and services associated with these architectures are also analyzed.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
VPN technologies
Article included in this offer
"Security of information systems"
(
87 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!