Virtual Private Networks (VPN) - Figure 7-25 Establishing a Virtual Private Network.
SSH Encryption (secure shell) - A pair of protocols (versions 1 and 2) that provides an authenticated and encrypted path to the shell or operating system command interpreter.
- The SSH protocol involves negotiation between local and remote sites for encryption algorithm (for example, DES, IDEA, AES) and authentication (including public key and Kerberos).
- VPN vs. SSH: http://www.howtogeek.com/118145/vpn-vs.-ssh-tunnel-which-is-more-secure/
Do'stlaringiz bilan baham: |