Please enable JavaScript.
Coggle requires JavaScript to display documents.
Modulo 18: VPNs - Coggle Diagram
Modulo 18: VPNs
18.3 IPsec Overview
-
-
18.3.4 Confidentiality
The degree of confidentiality depends on the encryption algorithm and the length of the key used in the encryption algorithm
-
-
-
18.3.6 Authentication
The device on the other end of the VPN tunnel must be authenticated before the communication path is considered secure.
-
-
-
-
-
18.2 VPN Topologies
-
-
18.2.3 SSL VPNs
When a client negotiates an SSL VPN connection with the VPN gateway, it actually connects using Transport Layer Security (TLS).
-
-
18.1 VPN Overview
-
18.1.2 VPN Benefits
Cost Savings
With the advent of cost-effective, high-bandwidth technologies, organizations can use VPNs to reduce their connectivity costs while simultaneously increasing remote connection bandwidth.
Security
VPNs provide the highest level of security available, by using advanced encryption and authentication protocols that protect data from unauthorized access.
Scalability
VPNs allow organizations to use the internet, making it easy to add new users without adding significant infrastructure.
Compatibility
VPNs can be implemented across a wide variety of WAN link options including all the popular broadband technologies. Remote workers can take advantage of these high-speed connections to gain secure access to their corporate networks.