3. VPNs based on other tunneling technologies
Several encapsulation protocols have been specified to meet specific needs. These protocols are sometimes used to create VPNs meeting specific constraints. The most widely used are L2TP and GRE.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
VPNs based on other tunneling technologies
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!