5.0 Security Fundamentals
5.5 Describe remote access and site-to-site VPNs
1. Remote Access VPNs: Remote Access VPNs allow individuals or employees to securely connect to an organization's network from remote locations, such as from home or while traveling. The VPN creates a secure, encrypted tunnel between the remote device and the organization's network, allowing users to access network resources and communicate with other devices on the network as if they were physically connected.
2. Site-to-Site VPNs: Site-to-Site VPNs allow different branches of an organization or different organizations to securely connect their networks over the internet. The VPN creates a secure, encrypted connection between the networks, allowing devices on each network to communicate with each other as if they were directly connected. This can be useful for sharing resources, such as files or printers, between different locations, or for providing secure connectivity between remote offices.
Both Remote Access VPNs and Site-to-Site VPNs use encryption and authentication methods to secure the connection and prevent unauthorized access. They also provide an added layer of security by masking the IP addresses of the connected devices and hiding their traffic from prying eyes. The specific configuration and security measures used in a VPN will depend on the type of VPN and the requirements of the organization.
Configuring remote access vpn on a cisco ios device
Here are the steps to configure a remote access VPN on a Cisco IOS device:
1. Configure a virtual tunnel interface (VTI) to be used for the VPN.
2. Configure the Internet Protocol Security (IPSec) protocol for encryption and authentication of the VPN connection.