Study and implementation of a high-availability site-to-site VPN
DOI:
https://doi.org/10.63883/ijsrisjournal.v5i1.552Abstract
Since the early days of the Internet until today, technology has evolved enormously. Since the advent of the Internet, information exchange has become commonplace; information is exchanged between one or more people; between a user and a server; between a company and its customers/partners via the Internet. The Internet is the network of networks. It is public and unsecured. Since all individuals and companies communicate and exchange data or information, they are all exposed to threats and risks when using the Internet as a means of transmission for communication.
The implementation of a VPN is based on decryption platforms. The configuration of these platforms depends on the operating system used. Establishing a VPN connection requires knowledge of cryptography and network configuration. Several solutions exist, using proprietary and open-source platforms. VPN technology guarantees secure exchanges of sensitive information, accessible from anywhere, as long as an internet connection is available.
Keywords: Study, Implementation, VPN, Site-to-Site, High Availability, Protocol
Received Date: December 20, 2025
Accepted Date: January 12, 2026
Published Date: February 01, 2026
Available Online at: https://www.ijsrisjournal.com/index.php/ojsfiles/article/view/552
Downloads
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Articles in IJSRIS Journal are published in open access under the Creative Commons Attribution License (CC BY) (https://creativecommons.org/share-your-work/cclicenses


















