1 00:00:01,900 --> 00:00:09,400 Let us have a look at some interesting security protocols or tunnelling protocols, the first one is 2 00:00:09,400 --> 00:00:14,570 data gramme transport layer security protocol, that is detailers protocol. 3 00:00:15,460 --> 00:00:23,470 Now, this protocol provides security for data ground based applications by allowing them to communicate 4 00:00:23,470 --> 00:00:30,400 in a way that is designed to prevent eavesdropping, tampering or message forgery. 5 00:00:31,150 --> 00:00:37,810 So basically, this protocol is meant for mitigating basic security attacks like data and putting or 6 00:00:38,260 --> 00:00:39,160 data forgery. 7 00:00:40,180 --> 00:00:45,760 Now it is based on the stream oriented transport layer security protocol. 8 00:00:45,760 --> 00:00:52,840 That is the protocol and it is intended to provide similar security guarantees. 9 00:00:56,170 --> 00:00:59,650 The next protocol is layer two tunnelling protocol. 10 00:01:00,370 --> 00:01:07,090 Now layer two tunneling protocol, it was created by the Internet Engineering Task Force. 11 00:01:07,090 --> 00:01:08,890 That is the IETF. 12 00:01:09,430 --> 00:01:16,000 It comes in handy for supporting the non IP protocols in weapons over the Internet. 13 00:01:17,710 --> 00:01:26,470 Now, L2 deep, that is layer two tunneling protocol is actually a combination of Microsoft Point-to-point 14 00:01:26,470 --> 00:01:34,210 Tethering Protocol BTP and Sisco's layer to forwarding protocol and to a protocol. 15 00:01:35,740 --> 00:01:41,170 Now a nice L to be that is layer to Rudling protocols feature. 16 00:01:41,170 --> 00:01:48,130 Is that because it works way down there at the datalink clear of the user model, that is the layer 17 00:01:48,130 --> 00:01:57,640 to it can support tons of protocols beyond just TCP IP, for example, in the network packet exchange 18 00:01:57,830 --> 00:02:00,310 that is IP X and the Eppalock. 19 00:02:00,880 --> 00:02:09,160 It's really a great tool to implement if you have to happen to launch DCB IP networks that need to be 20 00:02:09,160 --> 00:02:09,850 connected. 21 00:02:10,030 --> 00:02:11,020 Why are Internet? 22 00:02:12,580 --> 00:02:20,470 I just now mentioned about Point-to-point tunnelling protocol, that is the PDP protocol called this 23 00:02:20,470 --> 00:02:27,460 protocol was jointly developed by Microsoft, Lucent, 3Com and many other companies. 24 00:02:28,250 --> 00:02:33,750 It's not actually sanctioned by the IETF, but that doesn't mean it doesn't work. 25 00:02:34,450 --> 00:02:37,480 BTB acts by combining an. 26 00:02:39,070 --> 00:02:47,260 Unsecured Point-to-point protocol, that is a PP session with a second secured session using the generic 27 00:02:47,260 --> 00:02:50,280 routing protocol that is the GRV protocol. 28 00:02:50,770 --> 00:02:59,620 Don't worry, I am going to explain, Gary, in upcoming lecture now because BTP, that is Point-to-point 29 00:02:59,620 --> 00:03:03,420 Denlinger protocol uses two different protocols. 30 00:03:03,430 --> 00:03:10,870 That is beep point-to-point protocol and the GRV, that is generic routing protocol. 31 00:03:12,570 --> 00:03:15,030 Generic routing encapsulation protocol. 32 00:03:15,060 --> 00:03:25,590 Pardon me, it actually opens up to different network sessions, so be warned, BPD can give you some 33 00:03:25,590 --> 00:03:27,600 grief when passing through Arato. 34 00:03:28,440 --> 00:03:32,520 Now, this is a big reason you won't find it around nowadays. 35 00:03:32,880 --> 00:03:38,790 Another reason it's going the way of the dinosaurs, that is, it is not being used nowadays is that 36 00:03:38,790 --> 00:03:46,130 originally it gained popularity because it was the first virtual network protocol to be supported by 37 00:03:46,140 --> 00:03:48,990 Microsoft dialing networking services. 38 00:03:49,710 --> 00:03:54,540 And not too many of us depend on dialup to get connected to the Internet anymore. 39 00:03:55,020 --> 00:03:59,910 That is why the point to point Internet protocol is not being used these days. 40 00:04:00,330 --> 00:04:06,810 But as a fact of theory, you should always have knowledge of these protocols as it was the first VPN 41 00:04:06,810 --> 00:04:09,090 protocol supported by Microsoft. 42 00:04:10,680 --> 00:04:17,160 Now, another one is, in fact, you'd probably expect from a first generation security protocol that 43 00:04:17,520 --> 00:04:24,060 this protocol is nowadays really vulnerable to spoofing attacks, which is pretty much being replaced 44 00:04:24,060 --> 00:04:25,500 by Al Tuppy. 45 00:04:25,500 --> 00:04:31,460 That is layer to transport tunneling protocol and the Internet protocol secured one. 46 00:04:31,470 --> 00:04:33,010 That is the IP sac. 47 00:04:34,890 --> 00:04:35,820 Well, that is it. 48 00:04:35,820 --> 00:04:42,570 In this lecture, we have seen three major types of protocols, tunnelling protocols that data garam 49 00:04:42,570 --> 00:04:52,890 tunnelling layer protocol, DTL, then layer to the protocol to deep and BTP, that is Point-to-point 50 00:04:53,010 --> 00:04:54,030 Panelling protocol. 51 00:04:54,690 --> 00:04:56,670 I hope you have understood these protocols. 52 00:04:57,000 --> 00:05:03,560 If you have any doubt, feel free to answer to the Q&A section and I will see you in the next lecture.