Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Virtual Private Network (VPN)

15

Flashcards

0/15

Still learning
StarStarStarStar

IPSec (Internet Protocol Security)

StarStarStarStar

A suite of protocols for ensuring private, secure communications over IP networks through the use of cryptographic security services. Implementation scenario: Used to establish a secure connection between remote office networks.

StarStarStarStar

SSL VPN (Secure Sockets Layer VPN)

StarStarStarStar

Provides secure remote access to web applications and services through a web browser, without the need for client software. Implementation scenario: Used to grant remote users secure access to internal network services.

StarStarStarStar

OpenVPN

StarStarStarStar

An open-source VPN protocol that uses SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. Implementation scenario: Suitable for creating secure point-to-point or site-to-site connections.

StarStarStarStar

L2TP (Layer 2 Tunneling Protocol)

StarStarStarStar

A tunneling protocol used to support VPNs. L2TP does not provide encryption or confidentiality by itself and is often combined with IPSec. Implementation scenario: Commonly used to provide VPN connectivity for mobile devices.

StarStarStarStar

PPTP (Point-to-Point Tunneling Protocol)

StarStarStarStar

An obsolete method for implementing VPNs, with many known security issues, but is easy to set up. Implementation scenario: An older VPN solution, typically replaced by more secure protocols but can still be found in legacy systems.

StarStarStarStar

SSTP (Secure Socket Tunneling Protocol)

StarStarStarStar

A form of VPN tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. Implementation scenario: Utilized to enable remote users to access corporate networks securely, typically on Windows platforms.

StarStarStarStar

WireGuard

StarStarStarStar

A newer, simpler, and faster VPN protocol that utilizes state-of-the-art cryptography. Implementation scenario: Ideal for both small-scale personal use and large-scale corporate VPNs for its performance and simplicity.

StarStarStarStar

IKEv2 (Internet Key Exchange version 2)

StarStarStarStar

A protocol used to setup a security association (SA) within IPSec and to manage VPN negotiation. It excels in re-establishing broken connections. Implementation scenario: Commonly used in mobile VPN applications due to its mobility and multi-homing capabilities.

StarStarStarStar

MPLS (Multiprotocol Label Switching)

StarStarStarStar

A data-carrying technique that directs data from one node to the next based on short path labels rather than long network addresses. Implementation scenario: Often used by service providers to create VPNs over optimized network paths.

StarStarStarStar

DMVPN (Dynamic Multipoint Virtual Private Network)

StarStarStarStar

A dynamic tunneling form of a VPN that supports multiple connections from sites in a mesh topology. Implementation scenario: Particularly useful in situations where intermittent connections between network sites are expected.

StarStarStarStar

GRE (Generic Routing Encapsulation)

StarStarStarStar

A simple, universal, packet encapsulation protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links. Implementation scenario: Often used to encapsulate packets for tunneling them over an IP network.

StarStarStarStar

ZTNA (Zero Trust Network Access)

StarStarStarStar

A security concept where trust is never implied by default and network access is granted on a per-session basis. Implementation scenario: Used to implement granular, identity-driven access control within corporate networks.

StarStarStarStar

Cloud VPN

StarStarStarStar

VPN services that are delivered from cloud infrastructure and typically offer scalable, on-demand VPN connectivity. Implementation scenario: Ideal for businesses that require flexible and scalable remote access without on-premises hardware.

StarStarStarStar

Captive Portal VPN

StarStarStarStar

A network setup where users are presented with a web page requiring action before network access is granted, often implemented alongside a VPN for guest access. Implementation scenario: Frequently used in hotels, cafes, and public spaces to regulate Wi-Fi access.

StarStarStarStar

Split Tunneling

StarStarStarStar

A VPN feature that allows the user to decide which traffic is sent through the VPN tunnel and which is sent through the native network. Implementation scenario: Used to reduce VPN load by excluding local web traffic or specific applications.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.