Site to Site VPN
Site to Site VPN is also known as Router to Router VPN. It provides multiple users the ability to access each other’s resources. This VPN is mainly used in large companies and organizations with branch offices in different cities.
Site to Site are of two types -
-
Intranet-based VPN - When branch offices of the same company are connected using the Site-to-Site VPN type, it is called Intranet-based VPN.
- Extranet-based VPN - When different companies use Site-to-Site VPN to connect to each other, i.e. when a connection between two separate intranets is required, it is called Extranet-based VPN.
They are not easy to implement and require special equipment and resources. It creates an imaginary bridge between networks at remote offices for secure, smooth, and private communication.
Types of VPN Protocols
-
Internet Protocol Security(IPSec)
IPSec is generally used to secure Internet communication across an IP network. It verifies the session and encrypts each data packet during the connection. IPSec runs on two modes:- Transport and Tunneling Mode. Transport mode encrypts the message in the data packet, while Tunneling mode encrypts the whole data packet.
-
Layer 2 Tunneling Protocol(L2TP)
L2TP often combines with IPSec to establish a highly secure VPN connection. L2TP establishes a tunnel between two L2TP connection points, and then IPSec’s work is to encrypt the data and maintain a secure connection between the tunnel.
-
Point-to-Point Tunneling Protocol(PPTP)
PPTP is the most widely used VPN Protocol. It generates a tunnel and confines the data packet. It is used to encrypt the data between the connection. It is used on Windows, Mac, and Linux.
-
SSL and TLS
SSL stands for Secure Sockets Layer, while TLS stands for Transport Layer Security. Here the web browser acts as the client, and user access is prohibited to specific applications instead of the entire network in the VPN connection generated by SSL and TLS. Almost every web browsers come integrated with SSL and TLS, and SSL connections have ‘HTTPS’ instead of ‘HTTP’ at the starting of the URL.
-
OpenVPN
OpenVPN is an open-source VPN protocol, and it uses a traditional security protocol based on SSL and TLS protocols.
-
Secure Shell(SSH)
SSH generates a VPN tunnel for the data transfer. This tunnel is encrypted. An SSH client generates the connection, and the data transfer takes place through the tunnel from a local port onto the remote server.
FAQs
-
Name some VPN Protocols.
IP Security, OpenVPN, Secure Socket Layer, Transport Layer Security, PPTP, L2TP.
-
What does SSTP stand for?
Secure Socket Tunneling Protocol.
-
On what does Remote Access VPN rely?
It usually depends on IPsec or SSL to secure the connection.
-
What are the types of Site-to-Site VPN?
Intranet-based VPN and Extranet-based VPN.
-
Name an open-source VPN Protocol.
OpenVPN is an open-source VPN protocol.
Key Takeaways
In this article, we have extensively discussed the types of VPN and focused on the different types of VPN Protocols.
We hope that this blog has helped you enhance your knowledge regarding the types of VPNs. If you would like to learn more, check out our articles on What is VPN, Active and Passive Attacks, What is Information Security, Active Attack and Passive Attack, Need of Information Security.
Do upvote our blog to help other ninjas grow. Happy Coding!