Systems and Security : Implementation
1.3 Implementing secure network designs
Virtual private network (VPN) technologies
Virtual private network (VPN) technologies provide secure and encrypted connections between remote users and a company's internal network. There are several different types of VPNs, including:
1. Always-on VPNs, which are always connected and provide a secure connection to the internal network even when the user is not actively using it.
2. Split tunnel vs. full tunnel VPNs. A split tunnel VPN allows the user to access both the internal network and the internet, while a full tunnel VPN routes all traffic through the VPN.
3. Remote access vs. site-to-site VPNs. Remote access VPNs provide secure connections for remote workers, while site-to-site VPNs provide secure connections between multiple internal sites.
4. IPSec VPNs, which use the IPSec protocol to encrypt traffic and provide authentication.
5. SSL/TLS VPNs, which use SSL/TLS protocols to encrypt traffic and provide authentication.
6. HTML5 VPNs, which use the HTML5 technology to provide secure remote access to a company's internal network.
7. Layer 2 Tunneling Protocol (L2TP) VPNs, which use the L2TP protocol to provide secure connections between remote users and a company's internal network.
In addition to these VPN technologies, it is also important to implement strong security measures such as firewalls, access controls, and encryption to ensure the security of VPN connections.