CHAPTER 32

VIRTUAL PRIVATE NETWORKS AND SECURE REMOTE ACCESS

Justin Opatrny

32.1 INTRODUCTION

32.1.1 Borders Dissolving

32.1.2 Secure Remote Access

32.1.3 Virtual Private Networks

32.1.4 VPN Technology Concepts

32.2 SECURE CLIENT VPNs

32.2.1 IPSec

32.2.2 Transport Layer Security

32.2.3 User Authentication Methods

32.2.4 Infrastructure Requirements

32.2.5 Network Access Requirements

32.3 TRUSTED VPNs

32.3.1 Multiprotocol Layer Switching

32.3.2 Site-to-Site VPNs

32.3.3 Information Assurance Considerations

32.4 EXTRANETS

32.4.1 Information Assurance Goals

32.4.2 Extranet Concepts

32.4.3 Types of Extranet Access

32.4.4 Information Assurance Considerations

32.5 CONCLUSION

32.6 FURTHER READING

32.1 INTRODUCTION.

The rise of the Internet created a new chapter in human civilization. People are no longer tied to static information sources such as libraries. The seemingly exponential growth of people looking to access wide varieties of content also spurred the desire for mobility. If a person can search for information residing halfway around the world from home, why not be able to do the same from the local coffee shop or while sitting at an airport during a business trip? This information revolution offered an opportunity to provide information and services to consumers, businesses, and employees at virtually any point on the globe.

32.1.1 Borders Dissolving.

Prolific Internet access redefined the dynamics of network and perimeter protections. Previously, companies needed to focus on protecting ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.