2. VPN Topology
There are several methods for classifying VPNs. One of them is based on the topology of these VPNs.
2.1 Site to Site
In this case, the VPN is used to connect the local networks of two sites, allowing full communication between the computers at both sites—provided that any firewall filters permit it.
In the example shown in Figure 3 , all machines on the 192.168.75.0/24 network can communicate with machines on the 192.168.89.0/24 network and vice versa, provided that the rules configured on the firewalls allow it.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
VPN Topology
Article included in this offer
"Security of information systems"
(
89 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - DONENFELD (J.A.) - Wireguard : Next Generation Kernel Network Tunnel - (2020). PDF disponible en ligne https://www.wireguard. com/papers/wireguard.pdf
- (2) -...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!