Download - VPN Basics
![Page 1: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/1.jpg)
VPN BASICSBy Kevin Stevens
UATNTS4150
![Page 2: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/2.jpg)
VPNDefinition: A Virtual Private Network (VPN) is a
technology that allows secure communication via a “tunnel,” across public networks
![Page 3: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/3.jpg)
Types of VPN’sHardware – A dedicated appliance
specifically for use as a VPN.
-High performance-Quick implementation for large scale
deployment
Examples: SonicWALL NSA E8500
![Page 4: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/4.jpg)
Types of VPN’sSoftware – Software based VPN that can be
installed on existing infrastructure.
-Lower capex (Possibly free)-Better compatibility with mixed
environments
Examples: OpenVPN, OpenSwan
![Page 5: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/5.jpg)
VPN Advantages Cost efficient compared to dedicated
lines Ability to secure traffic through public
networks Faster deployment than other solutions
![Page 6: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/6.jpg)
VPN Disadvantages No control over Internet bandwidth Increase in network administration Incompatibility issues Can open remote vectors of attack
![Page 7: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/7.jpg)
VPN Configurations Remote Access – establishes a remote
connection on a client/server basis. Typically seen with telecommuters.
Network to network (site to site) – connects remote offices via end points.
![Page 8: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/8.jpg)
VPN Tunneling Protocols
IPSec – Operates at the network layer. Provides functionality to encrypt and authenticate IP data.
PPTP – Point-to-Point tunneling protocol. Operates at the Data link layer. Uses PPP to encapsulate data.
L2TP – Layer 2 Tunneling Protocol. Operates at the Data link layer. Uses PPP to encapsulate data. A combination of L2F and PPTP.
SSL – Works at different levels of the OSI, giving it flexibility.
![Page 9: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/9.jpg)
VPN Encryption Schemes VPN’s can be setup with a myriad of encryption
schemes. Here are some of the basics: PPP – can provide encryption through
Microsoft's Point-to-Point Encryption Protocol (MPPE). MPPE uses the RSA RC4 encryption algorithm.IPsec – provides encryption through the Encapsulating Security Payload (ESP). Supports various encryption algorithms.
SSL/TLS – provides a variety of encryption algorithms.
![Page 10: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/10.jpg)
*Note* The Virtual Private Network Consortium only supports the following secure VPN
technologies:
IPsec with encryption L2TP inside of IPsec SSL with encryption
![Page 11: VPN Basics](https://reader035.vdocument.in/reader035/viewer/2022062410/5681637c550346895dd45b27/html5/thumbnails/11.jpg)
ReferencesKrutz L., R., & Vines, R. D. (2007). The CISSP and CAP
Prep Guide. Indianapolis: Wiley Publishing.
Merkow, M., & Breithaupt, J. (2006). Information Security Principles and Practice. Upper Saddle River: Prentice Hall.
Northcutt, S., Zeltser, L., Winters, S., & Kent, K. R. (2005). Inside Network Security. Sams Publishing.
VPN Technologies: Definitions and Requirements. (n.d.). Retrieved November 28, 2010, from http://www.vpnc.org/vpn-technologies.html