Virtual Private Networks: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
Line 12: Line 12:
=Implementation=
=Implementation=


==[[OpenVPN]]==
==OpenVPN==


==PPTP (Microsoft)==
==PPTP (Microsoft)==


=Preface=
===Preface===


How does it work?
How does it work?
Line 22: Line 22:
Encryption
Encryption


=Servers=
===Servers===


=Implementation Windows=
===Implementation Windows===


=Implementation Unix=
===Implementation Unix===


mppe-patch
mppe-patch
pptpd
pptpd


=Clients=
===Clients===


Windows
Windows

Revision as of 13:27, 9 September 2005

Preface

This Page is also available in German.

Diese Seite ist auch in deutsch verfügbar.

Definition

A regular phyiscally existing network consisting of cables and routers/switches/etc is called a network. You run the various known internet protocols layer 1-4 on it. You can also use those protocols to emulate a virtual network. This is mostly done in layer 2 (IP). You tunnel the data of the virtual network encapsulated in IP-Packets for example. If you secure your tunnel as well with various encryption methods one might call the tunneled data a virtual private network. This is used in various scenarios, mostly for tunneling sensitive information over an inherently insecure architecture - for example to connect two corporate LANs over the internet.

Theory

Implementation

OpenVPN

PPTP (Microsoft)

Preface

How does it work? Authentication Encryption

Servers

Implementation Windows

Implementation Unix

mppe-patch pptpd

Clients

Windows Linux MacOS

IPSec

isakmpd (originally OpenBSD)

Freeswan