Explore tens of thousands of sets crafted by our community.
Virtual Private Network (VPN)
15
Flashcards
0/15
Cloud VPN
VPN services that are delivered from cloud infrastructure and typically offer scalable, on-demand VPN connectivity. Implementation scenario: Ideal for businesses that require flexible and scalable remote access without on-premises hardware.
L2TP (Layer 2 Tunneling Protocol)
A tunneling protocol used to support VPNs. L2TP does not provide encryption or confidentiality by itself and is often combined with IPSec. Implementation scenario: Commonly used to provide VPN connectivity for mobile devices.
MPLS (Multiprotocol Label Switching)
A data-carrying technique that directs data from one node to the next based on short path labels rather than long network addresses. Implementation scenario: Often used by service providers to create VPNs over optimized network paths.
DMVPN (Dynamic Multipoint Virtual Private Network)
A dynamic tunneling form of a VPN that supports multiple connections from sites in a mesh topology. Implementation scenario: Particularly useful in situations where intermittent connections between network sites are expected.
Split Tunneling
A VPN feature that allows the user to decide which traffic is sent through the VPN tunnel and which is sent through the native network. Implementation scenario: Used to reduce VPN load by excluding local web traffic or specific applications.
PPTP (Point-to-Point Tunneling Protocol)
An obsolete method for implementing VPNs, with many known security issues, but is easy to set up. Implementation scenario: An older VPN solution, typically replaced by more secure protocols but can still be found in legacy systems.
IPSec (Internet Protocol Security)
A suite of protocols for ensuring private, secure communications over IP networks through the use of cryptographic security services. Implementation scenario: Used to establish a secure connection between remote office networks.
OpenVPN
An open-source VPN protocol that uses SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. Implementation scenario: Suitable for creating secure point-to-point or site-to-site connections.
SSTP (Secure Socket Tunneling Protocol)
A form of VPN tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. Implementation scenario: Utilized to enable remote users to access corporate networks securely, typically on Windows platforms.
SSL VPN (Secure Sockets Layer VPN)
Provides secure remote access to web applications and services through a web browser, without the need for client software. Implementation scenario: Used to grant remote users secure access to internal network services.
WireGuard
A newer, simpler, and faster VPN protocol that utilizes state-of-the-art cryptography. Implementation scenario: Ideal for both small-scale personal use and large-scale corporate VPNs for its performance and simplicity.
IKEv2 (Internet Key Exchange version 2)
A protocol used to setup a security association (SA) within IPSec and to manage VPN negotiation. It excels in re-establishing broken connections. Implementation scenario: Commonly used in mobile VPN applications due to its mobility and multi-homing capabilities.
GRE (Generic Routing Encapsulation)
A simple, universal, packet encapsulation protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links. Implementation scenario: Often used to encapsulate packets for tunneling them over an IP network.
Captive Portal VPN
A network setup where users are presented with a web page requiring action before network access is granted, often implemented alongside a VPN for guest access. Implementation scenario: Frequently used in hotels, cafes, and public spaces to regulate Wi-Fi access.
ZTNA (Zero Trust Network Access)
A security concept where trust is never implied by default and network access is granted on a per-session basis. Implementation scenario: Used to implement granular, identity-driven access control within corporate networks.
© Hypatia.Tech. 2024 All rights reserved.