These networks can load balance on-the-fly allocating hardware resources more efficiently than the existing infrastructure may allow.
Dynamic virtual private networks are commonly used by businesses because they offer an extra measure of security with their authentication packet encryption protocols.
Dynamic virtual private networks (DVPN) are able to self-modify to recognize added nodes without the hardware and routers having to be able to identify them.
DVPNs use encryption and authentication to securely package data and deliver it across local or wide area networks (WANs). The data remains encapsulated until it reaches a destination where decryption takes place. tunneling is used to reach remote networks across WANs
There is no decryption of the data at the nodes through which the data passes, where there is most risk of interception by hackers. The security of this networking mechanism is dependent upon the security of the encryption keys used at either end of the transmission.
There are many methods and software solutions for creating DVPNs some include technology such as cryptographic tunneling protocols.
Secure VPN Protocols include:
- IPSec: Internet Security Protocol
- Transport Layer Security (TLS)
- Secure Sockets Layer (SSL)
- Datagram Transport Layer Security (DTLS)
- Secure Socket Tunneling Protocol (SSTP)
- Microsoft P-P Encryption (MPPE)
- Secure Shell (SSH)
As endpoints must authenticate before a tunneled connection can be established, stored passwords or digital certificates are used at the ends of DVPN tunnels to allow tunneling connections to be made without user intervention.
0 Comments