Download presentation
Presentation is loading. Please wait.
Published byDulcie Catherine Long Modified over 9 years ago
1
VPN Protocol
2
-2--2- What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and encryption to protect data integrity and confidentiality VPN Internet
3
VPN Protocol Virtual private network (VPN) protocols are a group of transmission control protocol/internet protocols (TCP/IPs) that enable the safe transfer of data over the Internet. A VPN is a network of computers that allows its users to connect to the Internet. protocol is a set of standardized rules that determines error detection methods, data authentication, signaling and representation of data over a communications channel---the medium used for the transfer of data from the sender to the receiver. Its purpose is to ensure a reliable channel for the exchange of data.
4
PPTP PPTP (Point to Point Tunneling Protocol) is a good, lightweight VPN protocol offering basic online security with fast speeds. PPTP is built-in to a wide array of desktop and mobile devices and features 128-bit encryption. PPTP is a good choice if OpenVPN isn't available on your device and speed is top priority.
5
-5--5- Point-to-Point Tunneling Protocol (PPTP) Layer 2 remote access VPN distributed with Windows product family – Addition to Point-to-Point Protocol (PPP) – Allows multiple Layer 3 Protocols Uses proprietary authentication and encryption Limited user management and scalability – Used MPPE encryption method Internet Remote PPTP Client ISP Remote Access Switch PPTP RAS Server Corporate Network
6
L2TP/IPsec L2TP (Layer 2 Tunneling Protocol) with IPsec (IP Security) is a very secure protocol built-in to a wide array of desktop and mobile devices. L2TP/IPsec features 256-bit encryption, but the extra security overhead requires more CPU usage than PPTP. L2TP/IPsec is an excellent choice if OpenVPN is not available on your device, but you want more security than PPTP.
7
-7--7- Layer 2 Tunneling Protocol (L2TP) Layer 2 remote access VPN protocol – Combines and extends PPTP and L2F (Cisco supported protocol) – Weak authentication and encryption – Addition to Point-to-Point Protocol (PPP) – Must be combined with IPSec for enterprise-level security Internet Remote L2TP Client ISP L2TP Concentrator L2TP Server Corporate Network
8
-8--8- Internet Protocol Security (IPSec) Layer 3 protocol for remote access, intranet, and extranet VPNs – Internet standard for VPNs – Provides flexible encryption and message authentication/integrity
9
OpenVPN OpenVPN is the premier VPN protocol designed for modern broadband networks, but is not supported by mobile devices and tablets. OpenVPN features 256-bit encryption and is extremely stable and fast over networks with long distances and high latency. It provides greater security than PPTP and requires less CPU usage than L2TP/IPsec. OpenVPN is the recommended protocol for desktops, including Windows, Mac OS X, and Linux.
10
Thanks for your attention
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.