D-Link DI-714 Introduction to Virtual Private Networking, Point-to-Point Tunneling Protocol PPTP

Models: DI-714

1 58
Download 58 pages 16.31 Kb
Page 9
Image 9

a wireless network card.

Most networks use hardware devices such as hubs or switches that each cable can be connected to in order to continue the connection between computers. A hub simply takes any data arriving through each port and forwards the data to all other ports. A switch is more sophisticated, in that a switch can determine the destination port for a specific piece of data. A switch minimizes network traffic overhead and speeds up the communication over a network.

Networks take some time in order to plan and implement correctly. There are many types of scenarios to consider which could affect the operability of a network.

Introduction to Virtual Private Networking

Virtual Private Networking (VPN) uses a publicly wired network (the Internet) to securely connect two different networks as if they were the same network. For example, an employee can access the corporate network from home using VPN, allowing the employee to access files and printers. Here are several different implementations of VPN that can be used.

Point-to-Point Tunneling Protocol (PPTP)

PPTP uses proprietary means of connecting two private networks over the Internet. PPTP is a way of securing the information that is communicated between networks. PPTP secures information by encrypting the data inside of a data packet.

9

Page 9
Image 9
D-Link DI-714 user manual Introduction to Virtual Private Networking, Point-to-Point Tunneling Protocol PPTP