Results 1 to 8 of 8

Thread: Different Protocols in Virtual Private Networks

  1. #1
    Join Date
    Apr 2010
    Posts
    84

    Different Protocols in Virtual Private Networks

    I have recently started studying about the Virtual Private Networks (VPN). I have cleared some basic concepts that are required to for simple setup. But still I am not having much knowledge about the protocols that are used in VPN. So I am posting here, so that anyone hanging out there can help me.!! Please provide some information about the protocols used in VPN as soon as possible.

  2. #2
    Join Date
    Feb 2006
    Posts
    185

    Re: Different Protocols in Virtual Private Networks

    Each protocol presented allows for performance of VPN solutions. The purpose of using web browsers is to allow users to use a tool they are accustomed and which requires no additional configuration. But when a certificate expires the user has to manually renew. This can pose problems for novice users. Also on most web browsers consulting lists of revoked certificates is not enabled by default any security based on such certificates Ssl this poses a serious security problem. Nothing prevents the more the customer to download a revised version of its browser to use new features (skins, plugins ...). Nothing certifies that the browser has not been changed and its certifying authority is a well.

  3. #3
    Join Date
    Feb 2009
    Posts
    90

    Re: Different Protocols in Virtual Private Networks

    Finally Another problem associated with the use of Web browsers such as basic VPN is their specificity to the online world. Indeed by default a browser that does not intercept communications or possibly Https ftps. All communications from other types of applications (MS Outlook or a database for example) are not supported. This problem is usually circumvented by running a dedicated Java applet in the browser. But this also implies the maintenance of this applet (make sure the client has the correct version, it can re-download required). The idea that the web browser is an ideal platform for achieving VPN access is seriously qualified.

  4. #4
    Join Date
    Jan 2009
    Posts
    163

    Re: Different Protocols in Virtual Private Networks

    Pptp has the advantage of being fully integrated into Windows environments. This means in particular that access to remote LAN can be made via the authentication system of Windows NT: RADIUS and its management and group rights. But like many Microsoft product safety is the weak point of the product :
    • Poor management of passwords in mixed environments Win 95/NT
    • Weaknesses in the generation of session keys: made from a hash of the password instead of being completely randomly generated. (Facilitates attacks "brute force")
    • Weaknesses MSCHAP a cryptographic protocol corrected in version 2 but no control over this version has been made by an independent entity.
    • Identification of unimplemented packages: vulnerability to attacks such as "spoofing"

  5. #5
    Join Date
    Feb 2006
    Posts
    331

    Re: Different Protocols in Virtual Private Networks

    The security mechanisms implemented in IPsec are more robust and more recognized than those established by Microsoft PPTP. By default L2TP protocol uses IPSec. But if the remote server does not support L2TP can use a different security protocol. Should therefore ensure that all facilities of a well implements L2TP IPSec protocol. IPsec does identify as machines and not users. This is particularly problematic for mobile users. It must therefore provide an authentication service users. In the case of dial-up is the login to be used to authenticate the user. But in the case of Internet connection it will provide an additional authentication phase of tunnel establishment.

  6. #6
    Join Date
    Feb 2008
    Posts
    102

    Re: Different Protocols in Virtual Private Networks

    Mpls is now the solution appeared to be the most mature market. The ability to obtain a QoS guarantee contract is something that weighs heavily in the balance of decision makers. However, only specialized operators provide this service This may pose new problems. Firstly, It is these operators that fix prices. This price includes a margin for forcing the service provider. On the other hand certain company does not want to outsource their communications to a single operator. Indeed, the stock market bubble burst around technology stocks has prompted a wave of bankruptcies of network operators and many companies have seen their connections cut off overnight. This risk is now firmly taken into account by decision makers. However, using multiple operators to manage the VPN complicates the management and configuration of it.

  7. #7
    Join Date
    Apr 2008
    Posts
    2,277

    Re: Different Protocols in Virtual Private Networks

    Mpls allows you to assign priorities to traffic through the service classes. Lower than that of Frame Relay and Atm but higher than other IP VPN. It is similar to the security offered by the networks existing Frame Relay and Atm. All applications, including enterprise software vital requiring high quality service and low latency and real-time applications (video and voice over IP ). Does not require high scalability as interconnection of equals between sites and standard deployments can support tens of thousands of VPN connections.

  8. #8
    Join Date
    May 2008
    Posts
    2,134

    Re: Different Protocols in Virtual Private Networks

    The transfer is being made on the public Internet, a service can only "best effort" in Ipsec. Low through transfer via the public Internet domain. Also the total security through a combination of digital certificates and PKI for authentication and a variety of options for encryption, including Triple DES and AES. Remote access and mobile secure. Applications over IP, including email and Internet. Unsuitable for real-time traffic or high priority. The most extensive deployments require careful planning to address particular problems of interconnection site to site and peering.

Similar Threads

  1. Virtual private network - FAQ's
    By Spy$Eyes in forum Tips & Tweaks
    Replies: 2
    Last Post: 25-12-2010, 08:04 AM
  2. What are the Tunneling Protocols of Virtual Private Network?
    By Mei-Xiu in forum Networking & Security
    Replies: 7
    Last Post: 31-08-2010, 09:20 AM
  3. What is a Virtual Private Network
    By Bindusar in forum Networking & Security
    Replies: 5
    Last Post: 20-12-2009, 06:39 AM
  4. How to create and use a virtual private network
    By Spykar in forum Guides & Tutorials
    Replies: 0
    Last Post: 21-02-2009, 05:17 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,574,152.06200 seconds with 16 queries