4. SSH vs. other VPN solutions
The role of a Virtual Private Network (VPN) is to extend a private network by using a public network, for example, in a secure way. A VPN makes it possible to link several entities or sites, and to integrate roaming users into a private network. Most VPNs are based on the use of tunnels, which rely on the use of a public network, where exchanges are secured. The way this works is to encapsulate the data to be transported in the packets of the protocol creating the tunnel.
Over the last decade, a number of security protocols have been developed and accepted by the Internet developer and user communities. One example is the PPTP protocol, developed by Microsoft, which installs a secure tunnel via PPP between mobile workstations (mainly running on Windows) and the intranet. However, for other uses, such as linking several intranets via a secure network, the IPSec protocol...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
SSH vs. other VPN solutions
References
Books
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference