From getting started to being proficient in hacker linux, Haima won't be able to handle VPN servers in 3 minutes

Source: Internet
Author: User
From getting started to being proficient in hacker linux, Ma Hao handled the VPN server agenda in three minutes :. VPN introduction. how VPN works. VPN data transmission protocol. VPN server construction case: the distance between departments of a company X is relatively long, and the company's network cannot be included in a LAN. to ensure the security of each lan... from getting started to being proficient in hacker linux, Ma Hao handled the VPN server agenda in three minutes :. VPN introduction. how VPN works. VPN data transmission protocol. VPN server construction case: Company X has a long distance between departments, and the company's network cannot accommodate a LAN, to ensure secure transmission and easy management of information in each Lan, what are your best methods as system administrators? Solution: 1. set up a dedicated line between each Lan and establish a point-to-point connection to form a wide area network. 2. establish a virtual private network using VPN technology. VPNVPN is short for virtual private network. It is a private network built on a public network. when you use a private network, it feels like a network connected by a VPC. its transmission channel is private and independent, however, the actual data is transmitted through the public network and thus becomes a virtual private network. Key technologies of VPN. security tunnel technology. encryption technology. authentication VPN data transmission protocol pptp. IP-based interconnection network. no Header Compression. no tunneling authentication. use PPP to encrypt L2tp. based on a variety of WAN connections, media such as Frame Relay, IP, X.25. header compression. tunnel authentication. use IPSec to encrypt client ----- PPTP/L2TP ------ server VPN security protocol (1) PPTP ---- point to point tunnel protocal (point-to-point Tunneling Protocol) data communication over the Internet, to encapsulate and encrypt data streams, PPTP can implement these two functions and implement multi-function communication over the Internet. VPN security protocol (II) L2TP ---- layer2 tunneling protocol (layer 2 tunnel protocol) PPTP is very similar to L2TP, because a part of L2TP is The PPTP protocol, both protocols allow the customer to establish a tunnel through the network. L2TP also supports channel authentication. Benefits of using VPN (1) reduce costs. (2) enhanced security. (3) network protocol support. (4) IP address security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.