![](/assets/images/picto-drapeau-france-3a76576a5d60a512053b4612ab58dae5.png)
1. Background and reminders
The aim of this report is not to explore VPNs in detail. and SSL/TLS protocols but to explain the specifics of using SSL/TLS protocols to create VPNs. However, in order to facilitate understanding, we will provide a few reminders in this section.
1.1 VPN
VPNs enable network resources to be interconnected, creating a virtual network using a public infrastructure. There are two main classes of VPN, depending on the position of the node where the flows are encapsulated in the tunnel:
before entering the operator's network (at the customer's premises): CE-based VPNs ;
on entry to the operator's network (at the operator's premises): network-based...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-286623ed91fa802ce039246e516e5852.png)
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Background and reminders
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-286623ed91fa802ce039246e516e5852.png)
The Ultimate Scientific and Technical Reference