A secure tunnel represents a one way connection route over a
computer network. The tunnel permits a given source to deliver information to a
single location. A positive return message should use a various secure tunnel
with various safety requirements.
Virtual Private Network:
A safe tunnel also can generate a virtual private network
(VPN) that allows a message using 1 communication standard protocol to visit
over the public network that will not support that protocol, while concealing
the actual destination address from the message.
PPTP:
There are many methods to setup a tunnel that vary in
difficulty, based on the level of protection required. As an example,
point-to-point-tunneling protocol (PPTP) is fairly easy. It combines tunneling
and encryption of data to really make it unreadable to unauthorized visitors.
L2TP:
Layer Two tunneling protocol (L2TP) is an example of a more
complex method to tunnel and build VPNs. Whilst PPTP and L2TP can be utilized
with more superior authentication techniques, L2TP uses a two-phase
authentication procedure for the two-points on the network, and then for user.
No comments:
Post a Comment