Overview

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHORS
-
Mohammed ACHEMLAL: Head of R&D Unit "Intranet Security Services" FTR&D/DMI/SIR
-
Michel DUDET: Head of Programs and Operations FTR&D/DMI
INTRODUCTION
This article describes the technologies used to build virtual private networks (VPNs). A classification of VPNs is proposed, identifying those that require interaction with a telecom operator's network and those that can be built independently of the transport network.
The article focuses on the main technologies operating at Layer 2 or Layer 3 of the OSI model: IPSec, L2TP, GRE and MPLS. The architectures and services associated with these architectures are also analyzed.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
VPN technologies
References
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference