Virtual private network

Types of VPN

What are the Different Protocols used in VPN Connections
Engineering Consortium, , p. Encapsulated Security Payload ESP encrypts the packet's payload the data it's transporting with a symmetric key. April 3, http: In this case routers are used for encryption and decryption of data at both the ends. Deciding which VPN is the best is not easy. GRE is a common solution to transport the information from one network to another. A VPN can also be used to interconnect two similar networks over a dissimilar middle network; for example, two IPv6 networks over an IPv4 network.

Types of VPN Protocols

Different Types of VPN Protocols

In this article we try to explain different types of VPNs and their advantages and disadvantages. But before we delve into that, a very brief introduction about VPNs. The VPN uses strong encryption and restricted, private data access which keeps the data secure from the other users of the underlying network which could often be a public network like the Internet.

VPNs have been used for years, but they have become more robust only in recent years. They are more affordable and also much faster. This is the most common and widely used VPN protocol. They enable authorized remote users to connect to the VPN network using their existing Internet connection and then log on to the VPN using password authentication. It allows different sites of the same organization, each with its own real network, to connect together to form a VPN. Unlike PPTP, the routing, encryption and decryption is done by the routers on both ends, which could be hardware-based or software-based.

L2TP was developed by Microsoft and Cisco. Among this are many overheads are running this Protocol, which means the latencies are depending on the access, situation and the location. It was created my Microsoft in collaboration with other technology companies. The greatest disadvantage is the necessity of security measures implement. Furthermore there is the disability of providing encryption.

The advantage is the provision of data confidentiality as well as data integrity, that means near-perfect accuracy in data transmission.

Biggest disadvantage and main difference between the PPTP and this VPN protocol is the the hardware-based and software-based routing, which encryption and decryption could be done by the routers on both ends.

VPN which can be reached over web browser, accessible via https instead of http. The decision which one to be used is not simple. It depends on the cost, the number of users, security and bandwidth. For individual users PPTP offer the best deal.

Navigation menu