Virtual Private Network (VPN) is defined through a public network (usually the Internet) to establish a temporary, secure connection, is a confusion of the public network through the security and stability of the tunnel. Virtual Private Network is an extension of the intranet. Virtual Private Network can help remote users, branch companies, business partners and suppliers with the company's internal network connection to establish a credible security and ensure the security of data transmission. Virtual Private Network for the growing world of mobile users Internet access, in order to achieve a secure connection; can be used for secure communication between enterprise sites virtual private lines, used to cost-effectively connect to business partners and customers secure extranet Virtual Private Network.
Virtual Private Network for Mobile Devices Product comparison: anthaVPN vs. Mergic Product comparison: anthaVPN vs. Mergic Both products are oriented to VPN remote connections; they are based on a different protocol that makes the radical difference between them. • Mergic VPN is a client for PalmOS that uses authentication and encryption technologies based on PPTP (Point-to-Point Tunnelling Protocol) for a secure connection over private networks. • Antha VPN is a client based on L2TP (Layer Two Tunnelling Protocol) protocol that is more efficient and secure than PPTP protocol. PPTP: Point to Point Tunnelling Protocol. Developed by Microsoft and available in all Windows platforms. Easiest implementation but less secure than L2TP. L2TP: Layer Two Tunnelling Protocol. Is an open standard and is available in the major platforms as Windows, Linux, Mac, etc. Implemented over IPSec it guarantees the highest security level. Can be used with public keys certificates (PKI) to encrypt and offer guarantee to the VPN users. L2TP/PPTP comparative table PPTP (Mergic VPN) L2TP (Antha VPN) Begins after the connection is It negotiates IPSec security processed (After PPP association before PPP connection is authentication). established. Encryption User level authentication over Allow use of digital certificates PPP authentication protocol. authentication over user authentication level. Authentication MPPE (Microsoft Point-To-Point L2TP/IPSec uses the Data Encryption Encryption) uses the RSA (Rivest- Standard (DES) developed by IBM Shamir-Aldeman) RC4  with 64 supported bytes (56 effective Connection algorithm and 40, 56 or 128 key key bits + 8 parity bits). length bits. 3 stages of DES with a separate key for each stage. The key length in 3DES is 168 effective bits. 1
Pages to are hidden for
"Virtual Private Network for Mobile Devices Product comparison "Please download to view full document