Virtual Private Network - Trusted Delivery Networks

Trusted Delivery Networks

Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic.

  • Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality-of-service control over a trusted delivery network.
  • Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's Layer 2 Forwarding (L2F) (obsolete as of 2009) and Microsoft's Point-to-Point Tunneling Protocol (PPTP).

From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.

Read more about this topic:  Virtual Private Network

Famous quotes containing the words trusted, delivery and/or networks:

    Naught was familiar but the heavens, from under whose roof the voyageur never passes; but with their countenance, and the acquaintance we had with river and wood, we trusted to fare well under any circumstances.
    Henry David Thoreau (1817–1862)

    There was no speculation so promising, or at the same time so praisworthy, as the United Metropolitan Improved Hot Muffin and Crumpet Baking and Punctual Delivery Company.
    Charles Dickens (1812–1870)

    The great networks are there to prove that ideas can be canned like spaghetti. If everything ends up by tasting like everything else, is that not the evidence that it has been properly cooked?
    Frederic Raphael (b. 1931)