{"id":399,"date":"2020-04-21T09:57:52","date_gmt":"2020-04-21T01:57:52","guid":{"rendered":"https:\/\/cciedump.spoto.net\/blog\/?p=399"},"modified":"2021-11-15T16:26:16","modified_gmt":"2021-11-15T08:26:16","slug":"want-you-know-what-is-vpn-role","status":"publish","type":"post","link":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html","title":{"rendered":"Want You Know What is VPN Role?"},"content":{"rendered":"\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-400\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-10.jpg\" alt=\"VPN Role\" width=\"602\" height=\"269\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-10.jpg 602w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-10-300x134.jpg 300w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/1-10-600x269.jpg 600w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure>\r\n\r\n\r\n\r\n<p><strong>CE (Custom Edge): <\/strong><\/p>\r\n\r\n\r\n\r\n<p>User equipment directly connected to the service provider.<\/p>\r\n\r\n\r\n\r\n<p>PE (Provider Edge Router):<\/p>\r\n\r\n\r\n\r\n<p>refers to the edge router on the backbone network, which is connected to the CE and is mainly responsible for the access of VPN services.<\/p>\r\n\r\n\r\n\r\n<p><strong>P (Provider Router): <\/strong><\/p>\r\n\r\n\r\n\r\n<p>refers to the core router on the backbone network, which mainly completes routing and fast-forwarding functions. Due to different network sizes, there may not be a P router in the network. The PE router may also be a P router at the same time.<\/p>\r\n\r\n\r\n\r\n<p><strong>Overlay VPN method:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Service providers only provide logical dedicated channels, and user edge routers directly exchange user routing information.<\/p>\r\n\r\n\r\n\r\n<p>\u00a0 <strong>L2 VPN: <\/strong>\u00a0<\/p>\r\n\r\n\r\n\r\n<p>Implemented through Layer 2 WAN technologies such as FR (Frame Relay) and ATM<\/p>\r\n\r\n\r\n\r\n<p><strong>L3 VPN:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>\u00a0through the three-layer tunnel technology GRE, IPsec<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-401\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-9-1024x376.jpg\" alt=\"VPN Role img\" width=\"1024\" height=\"376\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-9-1024x376.jpg 1024w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-9-300x110.jpg 300w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-9-768x282.jpg 768w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/2-9.jpg 1384w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n\r\n\r\n\r\n<p><strong>Features:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Establish a tunnel between CE and CE, and directly transfer routing information, routing protocol data is always exchanged between customer equipment, service providers know nothing about customer network structure. Typical representatives are GRE, IPSec<\/p>\r\n\r\n\r\n\r\n<p><strong>Advantage:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Different customer address spaces can overlap, and confidentiality and security are very good.<\/p>\r\n\r\n\r\n\r\n<p><strong>Disadvantages:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Customers need to create and maintain VPNs themselves. Usually, customers are unwilling and do not have this ability.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-402\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/3-8-1024x306.jpg\" alt=\"VPN Role Img\" width=\"1024\" height=\"306\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/3-8-1024x306.jpg 1024w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/3-8-300x90.jpg 300w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/3-8-768x230.jpg 768w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/3-8.jpg 1370w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n\r\n\r\n\r\n<p><strong>Features:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>A corresponding GRE tunnel is established on the PE for each VPN user, routing information is passed between the PE and the PE, and the P device in the public network does not know the routing information of the private network.<\/p>\r\n\r\n\r\n\r\n<p><strong>Advantage:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>The customer completely hands over the creation and maintenance of the VPN to the service provider, with better confidentiality and security.<\/p>\r\n\r\n\r\n\r\n<p><strong>Disadvantages:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Different VPN users cannot share the same address space. Even if they can share, the addresses between PE and CE, and the addresses between tunnels must not be the same, and a large number of ACLs and policy routes must be used. It is not feasible in practice.<\/p>\r\n\r\n\r\n\r\n<p><strong>Peer-to-Peer VPN:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Exchange user routing information between user routers and service provider routers;<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-403\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/5-3-1024x306.jpg\" alt=\"VPN Role Img\" width=\"1024\" height=\"306\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/5-3-1024x306.jpg 1024w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/5-3-300x90.jpg 300w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/5-3-768x230.jpg 768w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/5-3.jpg 1370w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n\r\n\r\n\r\n<p>A separate PE router is prepared for each VPN. Any routing protocol can be run between PE and CE, regardless of other VPNs. Run BGP or other routing protocols between PE and P, and use routing attributes to filter. There is no need to configure any ACL, which greatly reduces the administrator&#8217;s configuration workload. Every VPN user must add a dedicated PE, which is too expensive.<\/p>\r\n\r\n\r\n\r\n<p>Disadvantages: To prevent interworking between different CEs connected to the same PE, a large number of ACLs must be configured on the PE. Local routing conflict: How to distinguish the same route of different VPNs on the same PE?<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-404\" src=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/6-3.jpg\" alt=\"VPN Role Img\" width=\"755\" height=\"237\" srcset=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/6-3.jpg 755w, https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/6-3-300x94.jpg 300w\" sizes=\"(max-width: 755px) 100vw, 755px\" \/><\/figure>\r\n\r\n\r\n\r\n<p>All VPN user CEs are connected to the same PE. PEs and different CEs run different routing protocols or different processes of the same routing protocol. For example, the originating PE publishes VPN routes to the public network in OSPF. These routes are filtered on the PE at the end and then sent to the corresponding CE device. In order to avoid the leakage of routes between different VPN users, the shared route access method needs to configure a large number of ACLs to filter, which will have a very high performance and management cost Big burden.<\/p>\r\n\r\n\r\n\r\n<p>A PE router is prepared for each VPN. Any routing protocol can be run between PE and CE, regardless of other VPNs. Run BGP between PE and P, and use routing attributes to filter.<\/p>\r\n\r\n\r\n\r\n<p><strong>Advantages: <\/strong>No need to configure any ACL.<\/p>\r\n\r\n\r\n\r\n<p><strong>Disadvantages:<\/strong> Every VPN user has a dedicated PE, which is too expensive.<\/p>\r\n\r\n\r\n\r\n<p><strong>Three problems with VPN.<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Local routing conflict: How to distinguish the same route of different VPNs on the same PE?<\/p>\r\n\r\n\r\n\r\n<p>The propagation problem of routes in the network: two identical routes are both propagated in the network, how to distinguish the receiver?<\/p>\r\n\r\n\r\n\r\n<p>Packet forwarding problem: Even if the routing table conflict is successfully resolved, but when the PE receives an IP packet, how can it know which VPN to send to?<\/p>\r\n\r\n\r\n\r\n<p>(1) Address conflict?<\/p>\r\n\r\n\r\n\r\n<p>(2) &#8220;Provide a dynamically established tunnel technology&#8221;?<\/p>\r\n\r\n\r\n\r\n<p>LSP in MPLS is a natural tunnel, and the establishment of this tunnel is<\/p>\r\n\r\n\r\n\r\n<p>Based on the LDP protocol, it is exactly a dynamic label generation protocol.<\/p>\r\n\r\n\r\n\r\n<p>(3) A protocol for dynamically establishing the tunnel bearer?<\/p>\r\n\r\n\r\n\r\n<p>RIP, IS-IS, OSPF, EIGRP, BGP<\/p>\r\n\r\n\r\n\r\n<p><strong>Prerequisites<\/strong><\/p>\r\n\r\n\r\n\r\n<p>The main problems exist in the characteristics related to routing, so to solve these problems must be considered from the routing protocol. However, none of the existing routing protocols have the conditions to solve these problems, so they must be implemented by transforming the existing routing protocols. Choosing a suitable routing protocol to achieve transformation has become the first problem to be solved.<\/p>\r\n\r\n\r\n\r\n<p>As a candidate routing protocol, it must be able to adapt to a huge number of VPN routes, and the protocol must have good scalability. And it requires the protocol to have good scalability. Qualified agreements must be based on TLV elements (ease of expansion).<\/p>\r\n\r\n\r\n\r\n<p>OSPF is the most widely used routing protocol, but the scalability of this protocol is relatively poor,<\/p>\r\n\r\n\r\n\r\n<p>Moreover, it requires a lot of calculations on the received LSA, and it is difficult to adapt to the huge number of VPN routing RIPs on the public network.<\/p>\r\n\r\n\r\n\r\n<p>From the perspective of expansion, it is the scalability of TLV architecture, but the operation mechanism of RIP is not suitable for large networks. Other routing protocols also have corresponding unsuitable places,<\/p>\r\n\r\n\r\n\r\n<p>In the end, there is only the BGP protocol. Many characteristics of BGP make it suitable for transformation to meet the problem of address overlap on the VPN network.<\/p>\r\n\r\n\r\n\r\n<p><strong>BGP<\/strong><\/p>\r\n\r\n\r\n\r\n<p>The number of VPN routes in the network may be very large, and BGP is the only routing protocol that supports a large number of routes;<\/p>\r\n\r\n\r\n\r\n<p>BGP is based on TCP to establish a connection, which can exchange information between routers that are not directly connected, which eliminates the need for P routers to include VPN routing information;<\/p>\r\n\r\n\r\n\r\n<p>BGP can carry any information appended to the route. As optional BGP attributes, any BGP router that does not understand these attributes will transparently forward them, which makes it very simple to propagate routes between PE routers.<\/p>\r\n\r\n\r\n\r\n<p>Therefore, we can solve the three problems of VPN by combining MPLS and BGP, namely<\/p>\r\n\r\n\r\n\r\n<p><strong>Local routing conflict:<\/strong><\/p>\r\n\r\n\r\n\r\n<p>\u00a0it can be solved by creating different routing tables on the same router, and different interfaces can belong to different routing tables. This is equivalent to simulating a shared PE as multiple dedicated PEs.<\/p>\r\n\r\n\r\n\r\n<p>The problem of routing propagation in the network: You can add an identifier to this route during the routing process to distinguish different VPNs;<\/p>\r\n\r\n\r\n\r\n<p><strong>Packet forwarding problem: <\/strong><\/p>\r\n\r\n\r\n\r\n<p>Since the format of the IP packet cannot be changed, some information can be added to the IP header and the originating VPN will mark it so that the PE can forward the packet according to this mark when receiving the packet.<\/p>\r\n<div class='sfsi_Sicons' style='width: 100%; display: inline-block; vertical-align: middle; text-align:left'><div style='margin:0px 8px 0px 0px; line-height: 24px'><span>Please follow and like us:<\/span><\/div><div class='sfsi_socialwpr'><div class='sf_fb_share sf_icon' style='text-align:left;vertical-align: middle;'><a href='https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fcciedump.spoto.net%2Fblog%2Fwant-you-know-what-is-vpn-role_399.html' style='display:inline-block;'  > <img class='sfsi_wicon'  data-pin-nopin='true' width='auto' height='auto' alt='fb-share-icon' title='Facebook Share' src='https:\/\/cciedump.spoto.net\/blog\/wp-content\/plugins\/ultimate-social-media-icons\/images\/visit_icons\/fbshare_bck.png'  \/><\/a><\/div><div class='sf_twiter sf_icon' style='display: inline-block;vertical-align: middle;width: auto;margin-left: 7px;'>\r\n\t\t\t\t\t\t<a target='_blank' href='https:\/\/twitter.com\/intent\/tweet?text=Want+You+Know+What+is+VPN+Role%3F+https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html'style='display:inline-block' >\r\n\t\t\t\t\t\t\t<img data-pin-nopin= true width='auto' class='sfsi_wicon' src='https:\/\/cciedump.spoto.net\/blog\/wp-content\/plugins\/ultimate-social-media-icons\/images\/visit_icons\/en_US_Tweet.svg' alt='Tweet' title='Tweet' >\r\n\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div><div class='sf_pinit sf_icon' style='text-align:left;vertical-align: middle;float:left;line-height: 33px;width:auto;margin: 0 -2px;'><a href='#'  onclick='sfsi_pinterest_modal_images(event,\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html\",\"Want You Know What is VPN Role?\")' style='display:inline-block;'  > <img class='sfsi_wicon'  data-pin-nopin='true' width='auto' height='auto' alt='fb-share-icon' title='Pin Share' src='https:\/\/cciedump.spoto.net\/blog\/wp-content\/plugins\/ultimate-social-media-icons\/images\/share_icons\/Pinterest_Save\/en_US_save.svg'  \/><\/a><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The customer completely hands over the creation and maintenance of the VPN to the service provider, with better confidentiality and security.<\/p>\n","protected":false},"author":1,"featured_media":405,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[29],"tags":[154,155,153],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Want You Know What is VPN Role? - SPOTO Official Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Want You Know What is VPN Role? - SPOTO Official Blog\" \/>\n<meta property=\"og:description\" content=\"The customer completely hands over the creation and maintenance of the VPN to the service provider, with better confidentiality and security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html\" \/>\n<meta property=\"og:site_name\" content=\"SPOTO Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-21T01:57:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-15T08:26:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SPOTO Club\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#website\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/\",\"name\":\"SPOTO Official Blog\",\"description\":\"Focus on Online IT Training for 20+ Years\",\"publisher\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cciedump.spoto.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg\",\"contentUrl\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg\",\"width\":750,\"height\":400,\"caption\":\"VPN role\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#webpage\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html\",\"name\":\"Want You Know What is VPN Role? - SPOTO Official Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#primaryimage\"},\"datePublished\":\"2020-04-21T01:57:52+00:00\",\"dateModified\":\"2021-11-15T08:26:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cciedump.spoto.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Want You Know What is VPN Role?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#webpage\"},\"author\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\"},\"headline\":\"Want You Know What is VPN Role?\",\"datePublished\":\"2020-04-21T01:57:52+00:00\",\"dateModified\":\"2021-11-15T08:26:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#webpage\"},\"wordCount\":1137,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\"},\"image\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg\",\"keywords\":[\"cisco vpn\",\"SPOTO VPN Technologies\",\"VPN Role\"],\"articleSection\":[\"Cisco Technologies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#respond\"]}]},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638\",\"name\":\"SPOTO Club\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg\",\"contentUrl\":\"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg\",\"caption\":\"SPOTO Club\"},\"logo\":{\"@id\":\"https:\/\/cciedump.spoto.net\/blog\/#personlogo\"},\"description\":\"SPOTO is an excellent leader in IT certification training for 20+ years. We offer 100% real Cisco CCNA, CCNP exam dumps, CCIE Lab study materials, PMP, CISA, CISM, AWS, Palo Alto, and other IT exam dumps. We have helped thousands of candidates around the world to pass their IT exams on the first try! As the first-class online IT training organization in China, SPOTO cooperates with many giant Internet companies in China like Tencent, Baidu, and Alibaba. What\u2019s more, we have won lots of awards in IT education training such as \u201cTop Ten Influential Brands In Online Education Industry\u201d given by Baidu, \u201cOfficial IT Online Training Organization\u201d awarded by Tencent Class, etc. Join us: https:\/\/cciedump.spoto.net\/ Contact us: E-mail: support@spoto.net Phone \/ WhatsApp: +86 18344981205\",\"sameAs\":[\"https:\/\/cciedump.spoto.net\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Want You Know What is VPN Role? - SPOTO Official Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html","og_locale":"en_US","og_type":"article","og_title":"Want You Know What is VPN Role? - SPOTO Official Blog","og_description":"The customer completely hands over the creation and maintenance of the VPN to the service provider, with better confidentiality and security.","og_url":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html","og_site_name":"SPOTO Official Blog","article_published_time":"2020-04-21T01:57:52+00:00","article_modified_time":"2021-11-15T08:26:16+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SPOTO Club","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/cciedump.spoto.net\/blog\/#website","url":"https:\/\/cciedump.spoto.net\/blog\/","name":"SPOTO Official Blog","description":"Focus on Online IT Training for 20+ Years","publisher":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cciedump.spoto.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#primaryimage","inLanguage":"en-US","url":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg","contentUrl":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg","width":750,"height":400,"caption":"VPN role"},{"@type":"WebPage","@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#webpage","url":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html","name":"Want You Know What is VPN Role? - SPOTO Official Blog","isPartOf":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#primaryimage"},"datePublished":"2020-04-21T01:57:52+00:00","dateModified":"2021-11-15T08:26:16+00:00","breadcrumb":{"@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cciedump.spoto.net\/blog"},{"@type":"ListItem","position":2,"name":"Want You Know What is VPN Role?"}]},{"@type":"Article","@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#article","isPartOf":{"@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#webpage"},"author":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638"},"headline":"Want You Know What is VPN Role?","datePublished":"2020-04-21T01:57:52+00:00","dateModified":"2021-11-15T08:26:16+00:00","mainEntityOfPage":{"@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#webpage"},"wordCount":1137,"commentCount":0,"publisher":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638"},"image":{"@id":"https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#primaryimage"},"thumbnailUrl":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/04\/00-1.jpg","keywords":["cisco vpn","SPOTO VPN Technologies","VPN Role"],"articleSection":["Cisco Technologies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cciedump.spoto.net\/blog\/want-you-know-what-is-vpn-role_399.html#respond"]}]},{"@type":["Person","Organization"],"@id":"https:\/\/cciedump.spoto.net\/blog\/#\/schema\/person\/25594d4796697ccb1ef63d55c269c638","name":"SPOTO Club","image":{"@type":"ImageObject","@id":"https:\/\/cciedump.spoto.net\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg","contentUrl":"https:\/\/cciedump.spoto.net\/blog\/wp-content\/uploads\/2020\/03\/spoto-facemask-96x96.jpg","caption":"SPOTO Club"},"logo":{"@id":"https:\/\/cciedump.spoto.net\/blog\/#personlogo"},"description":"SPOTO is an excellent leader in IT certification training for 20+ years. We offer 100% real Cisco CCNA, CCNP exam dumps, CCIE Lab study materials, PMP, CISA, CISM, AWS, Palo Alto, and other IT exam dumps. We have helped thousands of candidates around the world to pass their IT exams on the first try! As the first-class online IT training organization in China, SPOTO cooperates with many giant Internet companies in China like Tencent, Baidu, and Alibaba. What\u2019s more, we have won lots of awards in IT education training such as \u201cTop Ten Influential Brands In Online Education Industry\u201d given by Baidu, \u201cOfficial IT Online Training Organization\u201d awarded by Tencent Class, etc. Join us: https:\/\/cciedump.spoto.net\/ Contact us: E-mail: support@spoto.net Phone \/ WhatsApp: +86 18344981205","sameAs":["https:\/\/cciedump.spoto.net\/"]}]}},"_links":{"self":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts\/399"}],"collection":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/comments?post=399"}],"version-history":[{"count":3,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts\/399\/revisions"}],"predecessor-version":[{"id":6309,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/posts\/399\/revisions\/6309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/media\/405"}],"wp:attachment":[{"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/media?parent=399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/categories?post=399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cciedump.spoto.net\/blog\/wp-json\/wp\/v2\/tags?post=399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}