Docstoc

Virtual Private Network for Mobile Devices Product comparison

Document Sample
Virtual Private Network for Mobile Devices Product comparison Powered By Docstoc
					Virtual Private Network for Mobile Devices

Product comparison: anthaVPN vs. Mergic
Product comparison: anthaVPN vs. Mergic

Both products are oriented to VPN remote connections; they are based on a different protocol
that makes the radical difference between them.

•   Mergic VPN is a client for PalmOS that uses authentication and encryption technologies
    based on PPTP (Point-to-Point Tunnelling Protocol) for a secure connection over private
    networks.
•   Antha VPN is a client based on L2TP (Layer Two Tunnelling Protocol) protocol that is more
    efficient and secure than PPTP protocol.

PPTP: Point to Point Tunnelling Protocol. Developed by Microsoft and available in all Windows
platforms. Easiest implementation but less secure than L2TP.


L2TP: Layer Two Tunnelling Protocol. Is an open standard and is available in the major
platforms as Windows, Linux, Mac, etc.    Implemented over IPSec it guarantees the highest
security level. Can be used with public keys certificates (PKI) to encrypt and offer guarantee
to the VPN users.


L2TP/PPTP comparative table



                     PPTP (Mergic VPN)                   L2TP (Antha VPN)



                     Begins after the connection is      It negotiates IPSec security
                     processed (After PPP                association before PPP connection is
                     authentication).                    established.
Encryption



                     User level authentication over      Allow use of digital certificates
                     PPP authentication protocol.        authentication over user
                                                         authentication level.
Authentication



                     MPPE (Microsoft Point-To-Point      L2TP/IPSec uses the Data Encryption
                     Encryption) uses the RSA (Rivest-   Standard (DES) developed by IBM
                     Shamir-Aldeman) RC4 [3]             with 64 supported bytes (56 effective
Connection           algorithm and 40, 56 or 128 key     key bits + 8 parity bits).
                     length bits.
                                                         3 stages of DES with a separate key
                                                         for each stage. The key length in
                                                         3DES is 168 effective bits.




                                                                                             1

				
DOCUMENT INFO
Shared By:
Stats:
views:26
posted:9/14/2010
language:English
pages:2
Description: Virtual Private Network (VPN) is defined through a public network (usually the Internet) to establish a temporary, secure connection, is a confusion of the public network through the security and stability of the tunnel. Virtual Private Network is an extension of the intranet. Virtual Private Network can help remote users, branch companies, business partners and suppliers with the company's internal network connection to establish a credible security and ensure the security of data transmission. Virtual Private Network for the growing world of mobile users Internet access, in order to achieve a secure connection; can be used for secure communication between enterprise sites virtual private lines, used to cost-effectively connect to business partners and customers secure extranet Virtual Private Network.