Encryption and electronic signature can be added simultaneously when encapsulating. With tunneling technology, packets transmitted on a physical communications medium such as conventional network cable or optical fiber are encapsulated as data of another protocol such as TCP/IP packets without directly transmitting on a physical network. A technique called "tunneling" that enables users to construct a virtual network between two remote points on an existing public IP network and communicate freely is used in the VPN. VPN is a solution for constructing a virtual network. 1.1.9 Platform Independence and Interchangeability 1.1.8 Advanced Function and Expandability 1.1.7 High-speed Communications Throughput 1.1.5 NAT, Proxy Server and Firewall Traversal 1.1.4 SoftEther VPN's Advantage and Characteristics Need for new VPN System to Compensate for Shortcomings in old VPN Protocol Limitations of Protocol that can Communicate within VPN Difficulty of Pass of Network Gateway Devices Inexpensive Internet Connection can be Used Instead of Dedicated Line Better Connectivity and Network Independence Ensuring Security of Transmitted Data by Encryption 1.1.2 Structure and Operating Principle of VPN
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |