2011年9月29日星期四

Tunneling Lets The Two Ends Of The VPN Communicate Across The Internet

Tunneling lets the two ends of the Tera Money communicate across the Internet. Since the Internet doesn't speak the same language as your network does, a tunnel packages the data you're sending so that the Internet can understand it.
Make the Connection

When you make a VPN connection, software on your end contacts the VPN gateway, for example, your office's Ethernet router. The gateway typically verifies that you are an approved user by checking your password. Then the VPN software creates the tunnel and adds a header to your data packet that the Internet can understand. When the packet reaches the gateway endpoint, the gateway pulls off the Internet header and routes the packet to its final destination.

VPNs use one of three technologies to create a tunnel: PPTP, L2TP, and the newest standard, Internet Protocol Security (also known as IPSec). While the tunnel creates the network, encryption makes it private, scrambling data so that only those who have the right digital key can decode it.

PPTP and Tera Gold
can verify a user's ID and scramble data using basic cryptography, which encrypts an entire file at once. That level of security suffices for most businesses. (For more information, see "How It Works: Encryption.") The truly security-conscious will want to consider the IPSec standard, which takes the process much further, verifying and encrypting each packet of data to ensure maximum privacy.

没有评论:

发表评论