Two or more devices on private network may communicate with each other in secure way. But devices communicate through public network such as Internet is vulnerable. Thus, a secure line between communication endpoints is needed, and here VPN appears to overcome this problem and secure the connection. Virtual Private Network (VPN) uses cryptographic algorithm to encapsulate the data packets going from one side to another over public network. Usually endpoint on both sides of communication tunnel use authentication technique before start VPN. As vulnerabilities are versatile such as spoofing, sniffing packets, etc, VPN uses many protocols to keep security high. Some of these protocols are; IPsec, Secure Shell (SSH), Layer Two Tunneling Protocol (L2TP) and many others.
No comments:
Post a Comment