Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Virtual Private Network (VPN)

15

Flashcards

0/15

Still learning
StarStarStarStar

Cloud VPN

StarStarStarStar

VPN services that are delivered from cloud infrastructure and typically offer scalable, on-demand VPN connectivity. Implementation scenario: Ideal for businesses that require flexible and scalable remote access without on-premises hardware.

StarStarStarStar

L2TP (Layer 2 Tunneling Protocol)

StarStarStarStar

A tunneling protocol used to support VPNs. L2TP does not provide encryption or confidentiality by itself and is often combined with IPSec. Implementation scenario: Commonly used to provide VPN connectivity for mobile devices.

StarStarStarStar

MPLS (Multiprotocol Label Switching)

StarStarStarStar

A data-carrying technique that directs data from one node to the next based on short path labels rather than long network addresses. Implementation scenario: Often used by service providers to create VPNs over optimized network paths.

StarStarStarStar

DMVPN (Dynamic Multipoint Virtual Private Network)

StarStarStarStar

A dynamic tunneling form of a VPN that supports multiple connections from sites in a mesh topology. Implementation scenario: Particularly useful in situations where intermittent connections between network sites are expected.

StarStarStarStar

Split Tunneling

StarStarStarStar

A VPN feature that allows the user to decide which traffic is sent through the VPN tunnel and which is sent through the native network. Implementation scenario: Used to reduce VPN load by excluding local web traffic or specific applications.

StarStarStarStar

PPTP (Point-to-Point Tunneling Protocol)

StarStarStarStar

An obsolete method for implementing VPNs, with many known security issues, but is easy to set up. Implementation scenario: An older VPN solution, typically replaced by more secure protocols but can still be found in legacy systems.

StarStarStarStar

IPSec (Internet Protocol Security)

StarStarStarStar

A suite of protocols for ensuring private, secure communications over IP networks through the use of cryptographic security services. Implementation scenario: Used to establish a secure connection between remote office networks.

StarStarStarStar

OpenVPN

StarStarStarStar

An open-source VPN protocol that uses SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. Implementation scenario: Suitable for creating secure point-to-point or site-to-site connections.

StarStarStarStar

SSTP (Secure Socket Tunneling Protocol)

StarStarStarStar

A form of VPN tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. Implementation scenario: Utilized to enable remote users to access corporate networks securely, typically on Windows platforms.

StarStarStarStar

SSL VPN (Secure Sockets Layer VPN)

StarStarStarStar

Provides secure remote access to web applications and services through a web browser, without the need for client software. Implementation scenario: Used to grant remote users secure access to internal network services.

StarStarStarStar

WireGuard

StarStarStarStar

A newer, simpler, and faster VPN protocol that utilizes state-of-the-art cryptography. Implementation scenario: Ideal for both small-scale personal use and large-scale corporate VPNs for its performance and simplicity.

StarStarStarStar

IKEv2 (Internet Key Exchange version 2)

StarStarStarStar

A protocol used to setup a security association (SA) within IPSec and to manage VPN negotiation. It excels in re-establishing broken connections. Implementation scenario: Commonly used in mobile VPN applications due to its mobility and multi-homing capabilities.

StarStarStarStar

GRE (Generic Routing Encapsulation)

StarStarStarStar

A simple, universal, packet encapsulation protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links. Implementation scenario: Often used to encapsulate packets for tunneling them over an IP network.

StarStarStarStar

Captive Portal VPN

StarStarStarStar

A network setup where users are presented with a web page requiring action before network access is granted, often implemented alongside a VPN for guest access. Implementation scenario: Frequently used in hotels, cafes, and public spaces to regulate Wi-Fi access.

StarStarStarStar

ZTNA (Zero Trust Network Access)

StarStarStarStar

A security concept where trust is never implied by default and network access is granted on a per-session basis. Implementation scenario: Used to implement granular, identity-driven access control within corporate networks.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.