Solved

VPN Tunnel, Point-to-Point, Same thing?

Posted on 2013-12-27
8
378 Views
Last Modified: 2013-12-29
I am a VPN illiterate.  I thought there was just ONE THING called VPN.  Now I find out there are several.
Question:  IS VPN tunnel and point-to-point and site-to-site the same thing?
0
Comment
Question by:brothertruffle880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 31

Assisted Solution

by:Gareth Gudger
Gareth Gudger earned 166 total points
ID: 39742795
Generally site to site and point to point are interchangeable. Probably depends on the manufacturer you work with. A VPN tunnel is generally used interchangeably as well but some folks may also refer to VPN or a VPN tunnel with regard to client-access VPNs. So I generally just use the terms site-to-site VPN or client-access VPN.
0
 
LVL 96

Assisted Solution

by:Experienced Member
Experienced Member earned 334 total points
ID: 39742796
A VPN tunnel can be site to site or client to site. The first is an arrangement of VPN machines or services at each end connected to each other.   A client to site arrangement has a client application on a remote computer connecting in.  I use both on my laptop depending on where I am.

Point to point is another terminology but the two methods above are the standard methodologies.

.... Thinkpads_User
0
 
LVL 70

Expert Comment

by:Qlemo
ID: 39742817
And to elaborate on "There can be only one!" - way off the mark! VPNs come in different tastes, like PPTP, IPSec, L2TP/IPSec, SSL, ...
0
Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

 
LVL 96

Expert Comment

by:Experienced Member
ID: 39742829
Your first question was about Site to Site terminology which has been answered here.

The second question is about types.  

PPTP, IPsec, SSL are type of VPN. They are all different although can come site to site or client to site.

.... Thinkpads_User
0
 

Author Comment

by:brothertruffle880
ID: 39743814
Can you give me a real-world example of a site-to-site and a client-to-site VPN?
Maybe that will help me understand the concept.
0
 
LVL 96

Accepted Solution

by:
Experienced Member earned 334 total points
ID: 39743953
I have a Home Consulting Office with an Cisco RV042G VPN router. Lashed onto this is a Cisco RV220W wireless router, but that is for completeness and beside the point.

The RV042G has 4 IPsec Site to Site tunnels to 4 clients. They are always connected, so I need only bring up Remote Desktop to access Servers and folders as needed.

When I take my Laptop away with me and away from the Home Consulting Office, I am no longer connected to it. I am away for a bit right now at our Cottage.

So now I have NCP Secure Entry which is a top notch IPsec Client Application. I can make a tunnel to any of the above 4 clients (1 client at a time with NCP) and do all the same functions.

The Home Office Desktop is always connected and so does not need a client application.

I trust that helps.   The complete subject is very complex and this is just a real world high level summary.

.... Thinkpads_User
0
 
LVL 70

Expert Comment

by:Qlemo
ID: 39744082
That's a valid viewpoint.
Imagine a client-to-site VPN as "dial-in", on-demand type of connection, and site-to-site as "being just another network". That is simplified, but true in the vast majority.
0
 
LVL 96

Expert Comment

by:Experienced Member
ID: 39745372
@brothertruffle880 - Thanks and I was happy to help.

... Thinkpads_User
0

Featured Post

 Database Backup and Recovery Best Practices

Join Percona’s, Architect, Manjot Singh as he presents Database Backup and Recovery Best Practices (with a Focus on MySQL) on Thursday, July 27, 2017 at 11:00 am PDT / 2:00 pm EDT (UTC-7). In the case of a failure, do you know how long it will take to restore your database?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question