Both Site to site VPN and Remote access VPN are the types of VPN which stands for Virtual Private Network.
Site-to-Site VPN is also known as Router-to-Router VPN. In site to site VPN, IPsec security method is used to create an encrypted tunnel from one customer network to remote site of the customer. Multiple users are not allowed in Site-to-Site VPN.
In Remote Access VPN, Individual users are connected to the private network and It allows the technique to access the services and resources of that private network remotely. It is most suitable for the business and home users. In remote access VPN, multiple users are allowed.
Let’s see the difference between Site to site vpn and Remote access vpn, which are given below:
|S.NO||Site to site VPN||Remote access VPN|
|1.||In site to site VPN, IPsec security method is used to create an encrypted tunnel from one customer network to remote site of the customer.||In remote access VPN, Individual users are connected to the private network.|
|2.||Site to site VPN does not need setup on each client.||Remote access VPN may or may not needed setup on each client.|
|3.||Site to site VPN does not require every user to initiate the VPN tunnel setup.||Remote access VPN require every remote access user to initiate the VPN tunnel setup.|
|4.||Site to site VPN supports IPsec technology.||While Remote access VPN supports SSL and IPsec technology.|
|5.||In site to site VPN, multiple users are not allowed.||In remote access VPN, multiple users are allowed.|
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- What is Cross Site Request Forgery (CSRF)
- Remote Direct Memory Access (RDMA)
- Difference between Uniform Memory Access (UMA) and Non-uniform Memory Access (NUMA)
- Difference between InfluxDB and Microsoft Access
- Introduction To RAT - Remote Administration Tool
- Difference between Rotational Latency and Disk Access Time in Disk Scheduling
- Difference between Random Access Memory (RAM) and Content Addressable Memory (CAM)
- Advantages and disadvantages of Remote Communication Technology
- Difference between Microsoft Excel and Microsoft Access
- Difference between Transfer Time and Disk Access Time in Disk Scheduling
- Difference between Seek Time and Disk Access Time in Disk Scheduling
- Remote File System (RFS) in File Management
- Access-Lists (ACL)
- Access Networks
- Access and trunk ports
- Wifi protected access (WPA)
- Reflexive Access-List
- Extended Access-List
- Standard Access-List
- Time based Access-List
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.