Virtual Private Networks: Difference between revisions
No edit summary |
|||
Line 12: | Line 12: | ||
=Implementation= |
=Implementation= |
||
== |
==OpenVPN== |
||
==PPTP (Microsoft)== |
==PPTP (Microsoft)== |
||
=Preface= |
===Preface=== |
||
How does it work? |
How does it work? |
||
Line 22: | Line 22: | ||
Encryption |
Encryption |
||
=Servers= |
===Servers=== |
||
=Implementation Windows= |
===Implementation Windows=== |
||
=Implementation Unix= |
===Implementation Unix=== |
||
mppe-patch |
mppe-patch |
||
pptpd |
pptpd |
||
=Clients= |
===Clients=== |
||
Windows |
Windows |
Revision as of 13:27, 9 September 2005
Preface
This Page is also available in German.
Diese Seite ist auch in deutsch verfügbar.
Definition
A regular phyiscally existing network consisting of cables and routers/switches/etc is called a network. You run the various known internet protocols layer 1-4 on it. You can also use those protocols to emulate a virtual network. This is mostly done in layer 2 (IP). You tunnel the data of the virtual network encapsulated in IP-Packets for example. If you secure your tunnel as well with various encryption methods one might call the tunneled data a virtual private network. This is used in various scenarios, mostly for tunneling sensitive information over an inherently insecure architecture - for example to connect two corporate LANs over the internet.
Theory
Implementation
OpenVPN
PPTP (Microsoft)
Preface
How does it work? Authentication Encryption
Servers
Implementation Windows
Implementation Unix
mppe-patch pptpd
Clients
Windows Linux MacOS