VPNs which refer to virtual private networks are available in different types. It is important that you know these various types and the one to use. Below are the four types of VPNs and when you should utilize them.
In client-based VPNs, the network is established between just one person, namely, the user, and a remote network. Often, the VPN connection is established with the use of an application. The VPN client in most cases is manually begun by the user. The user requires a username and password in order to authenticate the VPN client which is established between the computer of the user and the remote network an encrypted tunnel through which the remote network is accessed by the user. Typical examples of this type of VPNs are GlobalProtect of Palo Alto Networks, AnyConnect of Cisco and Pulse which was initially known as Juniper. Some operating systems such as mobile, Mac and Windows operating system come with built-in standard-based VPN client options. For example, Mac features IPsec of Cisco. L2TP and PPTP also are included in Mac OS X 10.10. With client-based VPN apps, users are able to easily connect their systems including mobile devices and laptops to private resources regardless of the location.
This type of VPN establishes a secure connection of two networks via an untrusted network. The IPsec-based WAN in which all departments of a business get connected to each other via the internet with the use of IPsec tunnels is a typical example of network-based VPNs. Network VPNs are available in a number of types like at http://www.vpn45.com/. The three commonest types of this network VPNs are as follows:
Dynamic Multipoint VPNs
IPSec Tunnels, both route-based and policy-based
This is the standard-based IPsec tunnel. It is the simplest kind of virtual private network which the majority of network routers and firewalls are able to build. This type of VPN has similar features with the client-based IPsec tunnel. In fact, in principle, it is the same with it. Both types of VPNs use encrypted traffic flows between networks in order to establish a secure tunnel. However, the difference lies in the fact that the IPsec tunnel brings traffic to the entire devices’ networks making it possible for them to communicate. The client-based IPsec tunnel is created to enclose traffic for one device.
There are certain concerns that should be settled when IPsec tunnel is being set up between two networks. They are as follows:
- The traffic that will be allowed to pass via the tunnel (here, there should be agreement on what to talk about)
- How to authenticate the tunnels (here the issue of trust that is how to trust each other has to be settled)
- Which of the two devices will be utilized as the tunnel’s endpoints (here the issue of who will be talking has to be agreed on)
Dynamic Multipoint VPN (DMVPN)
This is a more advanced VPN which is an improvement on the IPsec point-to-point tunnels into a cloud of networks that are connected together. As implicit from the name, the dynamic multipoint VPN makes it possible for any of the network to directly communicate across the DMVPN cloud with the other network.