51cto salon stage 15th: From configuration to design -- two-hour understanding of VPN
Virtual Private Network (VPN) refers to the technology for establishing a private network on a public network. This technology has long created a relatively secure and stable network access environment for various enterprises and institutions. However, VPN varies depending on the implementation and encryption methods and software and hardware products. The effect is different from the scenario. Are you sure you understand it? Come to the salon to discuss it!
(Easy and casual, free to talk and everyone is equal. Face-to-face with the host and give your own questions or opinions. Come and enjoy this interactive feast.)
Registration address: http://www.51cto.com/exp/salon/51cto-salon-15.php
Time: Fourteen o'clock P.M. on Saturday, October 29.
This 51cto offline salon will talk about From configuration to design-Understanding VPN in two hours .
Topic 1: VPN design-virtual or reality)
Although there are many VPN technologies, different protocols are used in different scenarios. For example, mpls vpn is generally used by ISP. Enterprise VPN is commonly used for IPSec, ssl vpn, L2TP, L2TP/IPSec, and PPTP. You need to know what scenarios are suitable for Using VPN. All scenarios for demand implementation are available.
Topic Introduction 2: VPN Technology & Application Discussion (Yang zhengquan)
This section describes various VPN methods, focuses on IPSec VPN and ssl vpn, and does not describe VPN of private protocol. It simulates two open source VPNs, openswan and openvpn.
Registration address: http://www.51cto.com/exp/salon/51cto-salon-15.php