Virtual Private Network - Trusted Delivery Networks

Trusted Delivery Networks

Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic.

  • Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality-of-service control over a trusted delivery network.
  • Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's Layer 2 Forwarding (L2F) (obsolete as of 2009) and Microsoft's Point-to-Point Tunneling Protocol (PPTP).

From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN.

Read more about this topic:  Virtual Private Network

Famous quotes containing the words trusted, delivery and/or networks:

    When people say women can’t be trusted because they cycle every month, my response is that men cycle every day, so they should only be allowed to negotiate peace treaties in the evening.
    June Reinisch (b. 1943)

    There was no speculation so promising, or at the same time so praisworthy, as the United Metropolitan Improved Hot Muffin and Crumpet Baking and Punctual Delivery Company.
    Charles Dickens (1812–1870)

    To be perfectly, brutally honest, those of us who are still carrying diaper everywhere we go are not at our most scintillating time of life....We need to remember that at one time in our lives, we all had senses of humor and knew things that were going on in the world. And if we just keep our social networks open, there will be people ready to listen when we once again have intelligent things to say.
    Louise Lague (20th century)