Virtual Private Networks: Difference between revisions
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
=Definition= |
=Definition= |
||
A regular phyiscally existing network consisting of cables and routers/switches/etc is called a |
A regular phyiscally existing network consisting of cables and routers/switches/etc is called a '''network'''. You run the various known internet protocols layer 1-4 on it. You can also use those protocols to emulate a '''virtual network'''. This is mostly done in layer 2 (IP). You tunnel the data of the virtual network encapsulated in IP-Packets for example. If you secure your tunnel as well with various encryption methods one might call the tunneled data a '''virtual private network'''. This is used in various scenarios, mostly for tunneling sensitive information over an inherently insecure architecture - for example to connect two corporate LANs over the internet. |
||
=Theory= |
=Theory= |
Revision as of 13:23, 9 September 2005
Preface
This Page is also available in German.
Diese Seite ist auch in deutsch verfügbar.
Definition
A regular phyiscally existing network consisting of cables and routers/switches/etc is called a network. You run the various known internet protocols layer 1-4 on it. You can also use those protocols to emulate a virtual network. This is mostly done in layer 2 (IP). You tunnel the data of the virtual network encapsulated in IP-Packets for example. If you secure your tunnel as well with various encryption methods one might call the tunneled data a virtual private network. This is used in various scenarios, mostly for tunneling sensitive information over an inherently insecure architecture - for example to connect two corporate LANs over the internet.