Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURITY DEVICES AND TECHNOLOGIES (VPN protocols (It has a different…
SECURITY DEVICES AND TECHNOLOGIES
Virtual Private Network (VPN)
creates a safe and encrypted connection over a less secure network, such as the internet
VPN technology was developed as a way to allow remote users and branch offices to securely access corporate applications and other resources
To ensure safety, data travels through secure tunnels and VPN users must use authentication methods
To ensure safety, data travels through secure tunnels and VPN users must use authentication methods
Pros and cons of using a VPN
it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it
The justification for using VPN access instead of a private network usually boils down to cost and feasibility
Performance can also be affected by poor quality of service and conditions that are outside the control of IT.
VPN protocols
It has a different protocols used to secure and encrypt users and corporate data:
IP security (IPsec)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Point-To-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
OpenVPN
The most common types of VPNs are remote-access VPNs and site-to-site VPNs
Remote Access VPN
uses a public telecommunication infrastructure like the internet to provide remote users secure access to their organization's network
important when employees are using a public Wi-Fi hotspot or other avenues to use the internet and connect into their corporate network
A VPN client on the remote user's computer or mobile device connects to a VPN gateway on the organization's network
The gateway typically requires the device to authenticate its identity
Site-to-site VPN
uses a gateway device to connect the entire network in one location to the network in another -- usually a small branch connecting to a data center
End-node devices in the remote location do not need VPN clients because the gateway handles the connection.
use carrier MPLS clouds, rather than the public internet, as the transport for site-to-site VPNs