CIS 170F: Windows 7 Administration

Week 11

Remote Access
Remote Access VPN Connectivity
VPN Protocols

  • Communication protocols, called tunneling protocols, manage the virtual private link and encrypt the data it carries.




  • Point-to-Point Tunneling Protocol (PPTP) allows IP-based networks to deliver PPP packets by encapsulating them in IP packets. IP packets can be routed through public networks. PPTP can be used with TCP/IPv4 and TCP/IPv6 networks.

    Read more about PPTP at:
    http://en.wikipedia.org/wiki/Point-to-point_tunneling_protocol.
  • Layer 2 Tunneling Protocol (L2TP) encapsulates PPP packets to be sent over IP network connections. It started as a combination of PPTP and Layer 2 Forwarding (L2F) tunneling protocols. IPSec provides encryption for L2TP connections. L2TP can be used with TCP/IPv4 and TCP/IPv6 networks.

    Read more about L2TP at:
    http://www.cisco.com/warp/public/cc/pd/iosw/tech/l2pro_tc.htm.
  • Secure Socket Tunneling Protocol (SSTP) allows IP-based networks to deliver traffic through firewalls that would otherwise block PPTP and L2TP traffic.
  • Internet Key Exchange v2 Tunneling Protocol (IKEv2) standardizes the use of the IPSec protocol to establish a Security Association (SA) between the VPN client and server.
  • IKEv2 Mobility and Multihoming Protocol (MOBIKE) allows a VPN client to lose its network connection and still reconnect to its original SA once network connectivity is restored.