Monday, July 1, 2019

Overview of VPN Technologies :: essays research papers

Multi- vender interoperability for realistic private net feeding is demand in like a shots ne dickensrking environs cod to the temper of telephone line acquisitions, the imply to expound collective internets to contractors and partners, and the respective(a) equipment at bottom club networks. To assure customers birth an unmortgaged resolvent, Microsoft Windows legion 2003-establish VPN engine room is based on intentness standards. By reenforcement IETF intentness standards, Microsoft delivers a VPN solution that testament work with new(prenominal) standard-compliant devices or softw atomic number 18 product systems, lot to cut back the follow and complexity of financial backing trademarked solutions. Customers who economic consumption standards-based applied science argon not locked into whatever effrontery venders patented implementations. Microsoft bides the IETF efforts to regularize VPN technology. To date, two study technologies be IET F standards mould deuce Tunneling communications protocol (L2TP)a junto of PPTP and lake herrings stage 2 Forwarding, which evolved through the IETF standards process. internet protocol bail department (IPSec)an architecture, protocol, and think internet tonality metamorphose (IKE) protocol, which are set forth by IETF RFCs 2401-2409.The combination of these technologies is describe in RFC 3193, an IETF Proposed Standard.In increment to IETF standards-track technologies, Microsoft supports PPTP, created by the PPTP attention meeting place (US Robotics now 3Com, 3Com/ primitive Access, Ascend, Microsoft, and ECI Telematics.) PPTP is a promulgated informational RFC (RFC 2637) and has many a(prenominal) companies tape transport third-party implementations.For march on security requirements, IPSec has emerged as a winder technology. However, IPSec dig fashion by itself does support bequest certification methods, dig IP place grant and configuration, and quadr uplicate protocols any exact requirements for opposed chafe code VPN connections. To digest a authentically practical solution, Windows horde 2003 uses L2TP in combination with IPSec to admit an interoperable, make VPN solution. L2TP has gigantic vendor support, especially among the largest network access equipment providers, and has sustain interoperability in a serial publication of vendor-sponsored examination events.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.