Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Point-to-Point Tunneling Protocol

Index Point-to-Point Tunneling Protocol

The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues. [1]

29 relations: Ascend Communications, Authentication, Bruce Schneier, Challenge-Handshake Authentication Protocol, Data Encryption Standard, Encryption, Extensible Authentication Protocol, Generic Routing Encapsulation, Internet Engineering Task Force, Internet Protocol, Internetwork Packet Exchange, IPsec, Layer 2 Tunneling Protocol, Microsoft, Microsoft Point-to-Point Encryption, Microsoft Windows, MS-CHAP, NetBIOS, Nokia, OpenVPN, Password Authentication Protocol, Point-to-Point Protocol, Public key infrastructure, RC4, Secure Socket Tunneling Protocol, The Register, Transmission Control Protocol, Virtual private network, 3Com.

Ascend Communications

Ascend Communications was an Alameda, California-based manufacturer of communications equipment that was later purchased by Lucent Technologies in 1999.

New!!: Point-to-Point Tunneling Protocol and Ascend Communications · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Point-to-Point Tunneling Protocol and Authentication · See more »

Bruce Schneier

Bruce Schneier (born January 15, 1963, is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization.

New!!: Point-to-Point Tunneling Protocol and Bruce Schneier · See more »

Challenge-Handshake Authentication Protocol

In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity.

New!!: Point-to-Point Tunneling Protocol and Challenge-Handshake Authentication Protocol · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Point-to-Point Tunneling Protocol and Data Encryption Standard · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Point-to-Point Tunneling Protocol and Encryption · See more »

Extensible Authentication Protocol

Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.

New!!: Point-to-Point Tunneling Protocol and Extensible Authentication Protocol · See more »

Generic Routing Encapsulation

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.

New!!: Point-to-Point Tunneling Protocol and Generic Routing Encapsulation · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Point-to-Point Tunneling Protocol and Internet Engineering Task Force · See more »

Internet Protocol

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

New!!: Point-to-Point Tunneling Protocol and Internet Protocol · See more »

Internetwork Packet Exchange

Internetwork Packet Exchange (IPX) is the network layer protocol in the IPX/SPX protocol suite.

New!!: Point-to-Point Tunneling Protocol and Internetwork Packet Exchange · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Point-to-Point Tunneling Protocol and IPsec · See more »

Layer 2 Tunneling Protocol

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

New!!: Point-to-Point Tunneling Protocol and Layer 2 Tunneling Protocol · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Point-to-Point Tunneling Protocol and Microsoft · See more »

Microsoft Point-to-Point Encryption

Microsoft Point-to-Point Encryption (MPPE) encrypts data in Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections.

New!!: Point-to-Point Tunneling Protocol and Microsoft Point-to-Point Encryption · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Point-to-Point Tunneling Protocol and Microsoft Windows · See more »

MS-CHAP

MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, CHAP.

New!!: Point-to-Point Tunneling Protocol and MS-CHAP · See more »

NetBIOS

NetBIOS is an acronym for Network Basic Input/Output System.

New!!: Point-to-Point Tunneling Protocol and NetBIOS · See more »

Nokia

Nokia is a Finnish multinational telecommunications, information technology, and consumer electronics company, founded in 1865.

New!!: Point-to-Point Tunneling Protocol and Nokia · See more »

OpenVPN

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.

New!!: Point-to-Point Tunneling Protocol and OpenVPN · See more »

Password Authentication Protocol

Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users.

New!!: Point-to-Point Tunneling Protocol and Password Authentication Protocol · See more »

Point-to-Point Protocol

In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communications protocol used to establish a direct connection between two nodes.

New!!: Point-to-Point Tunneling Protocol and Point-to-Point Protocol · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Point-to-Point Tunneling Protocol and Public key infrastructure · See more »

RC4

In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.

New!!: Point-to-Point Tunneling Protocol and RC4 · See more »

Secure Socket Tunneling Protocol

Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel.

New!!: Point-to-Point Tunneling Protocol and Secure Socket Tunneling Protocol · See more »

The Register

The Register (nicknamed El Reg) is a British technology news and opinion website co-founded in 1994 by Mike Magee, John Lettice and Ross Alderson.

New!!: Point-to-Point Tunneling Protocol and The Register · See more »

Transmission Control Protocol

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.

New!!: Point-to-Point Tunneling Protocol and Transmission Control Protocol · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Point-to-Point Tunneling Protocol and Virtual private network · See more »

3Com

3Com Corporation was a digital electronics manufacturer best known for its computer network products.

New!!: Point-to-Point Tunneling Protocol and 3Com · See more »

Redirects here:

PPTP, Point to Point Tunneling Protocol, Point-to-point tunneling protocol, Pptp, Pptpd.

References

[1] https://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol

OutgoingIncoming
Hey! We are on Facebook now! »