VPN Architecture

Stan Kurkovsky, Central Connecticut State University

Introduction

Motivation for VPNs

VPN Functionality and Technologies

VPN Solutions

VPN Architecture

Types of VPN Architectures

Types of VPNs

VPN Gateways

Site-to-Site Intranet VPN Gateway Functionality

Remote Access VPN Gateway Functionality

Extranet VPN Functionality

Additional Functionality of VPN Gateways

VPN Gateway Provisioning

VPN Gateway Management

VPN Gateways and VPN Design

VPN Clients

VPN Client Functionality

Additional Functionality of VPN Clients

VPN Clients for Specific Operating Systems

Summary

Glossary

Cross References

References

INTRODUCTION

Motivation for Virtual Private Network (VPNs)

Ever since people started communicating effectively with one another, the issue of privacy has been a cornerstone. How do we protect our communication from being accessed by those who do not need to know about it? The Internet environment, in which most modern communication takes place, adds its own specifics to the nature of communication: it is conducted in a public medium. Virtual private networks (VPNs) provide the means for conducting private communications in the public Internet (Cohen & Kaempfer, 2000; Herscovitz, 1999; Tuomenoksa, 2002). A VPN merges the concept of a virtual network that exists on top of the Internet with the concept of a private network that provides confidentiality.

In the modern world dominated by business communication, VPNs provide an irreplaceable tool that enables businesses to communicate ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.