Please enable JavaScript.
Coggle requires JavaScript to display documents.
3.0 Security Devices and Technologies (3.9) (Virtual Private Network…
3.0 Security Devices and Technologies (3.9)
Virtual Private Network
Definition
Technology that creates a safe and encrypted connection over a less secure network such as the Internet
an encrypted connection between private networks over a public network such as the Internet.
(Private network)
Function
Allows two hosts to exchange (swap over) data using a secure channel
The data stream (flow) is encrypted for security
Remote VPN clients are also supported.
A VPN can be configured as a connection between two endpoints or between many endpoints
We can connect two offices over an Internet connection, or connect several offices to create a secure private network
To ensure safety, data travels through secure tunnels and VPN users must use authentication methods including passwords,tokens and other unique identification methods to gain access to the VPN.
Pros and Cons of using a VPN
Pros
Secure connection for your devices
Protects you from hackers
Access to foreign websites, geo-restricted websites, content and streaming services
Cons
Slower connection speeds (depends on your ISP as well as the VPN)
A good one costs money
VPN Protocols
IP security (IPsec)
Secure Sockets Layer(SSL)
Transport Layer Security (TLS)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Types of VPN
Remote -access VPN
Site-to-site VPN