filmov
tv
VPN Types Options and Protocols Explained
Показать описание
What if you wanted to connect two different business locations together so that they appeared like they were on the same network? What if you want to let an employee access internal business resources while on a business trip? In both cases, they will use a VPN.
Different types of VPNs secure traffic in different ways, however. We expressed two different use cases in our questions above. Let’s explain.
If you want to connect two different business locations, you’ll use a site-to-site VPN. A site-to-site VPN creates a virtualized tunnel between the firewalls at both locations. That way, encrypted and secure traffic can pass back and forth between both locations. These types of connections typically use the IPSec protocol to secure traffic.
On the other hand, employees will use something called a remote access VPN. A tunnel for a remote-access VPN can be created through something like a web portal or a software application. Most employees prefer using an application since a web portal can severely restrict what type of data can be accessed and how it can be interacted with. A VPN created through a web portal will often use SSL & TLS to encrypt data in transport. On the other hand, a VPN managed by an application can use SSL & TLS or IPsec.
The IPsec umbrella protocol is used to configure both site-to-site and remote-access VPNs in the same way. Both will use ESP or encapsulating security protocol. Both establish hashes, authentication, the lifetime of the connection, and the encryption standard when the VPN tunnel is created. Remote-access VPNs can also use a XAuth header to identify the specific user.
Are you ready to learn more? Then pull up your chair and watch the video above right now!
-----------------
Connect with CBT Nuggets for the latest in IT training:
#vpn #virtualprivatenetwork #ittraining #cbtnuggets
Different types of VPNs secure traffic in different ways, however. We expressed two different use cases in our questions above. Let’s explain.
If you want to connect two different business locations, you’ll use a site-to-site VPN. A site-to-site VPN creates a virtualized tunnel between the firewalls at both locations. That way, encrypted and secure traffic can pass back and forth between both locations. These types of connections typically use the IPSec protocol to secure traffic.
On the other hand, employees will use something called a remote access VPN. A tunnel for a remote-access VPN can be created through something like a web portal or a software application. Most employees prefer using an application since a web portal can severely restrict what type of data can be accessed and how it can be interacted with. A VPN created through a web portal will often use SSL & TLS to encrypt data in transport. On the other hand, a VPN managed by an application can use SSL & TLS or IPsec.
The IPsec umbrella protocol is used to configure both site-to-site and remote-access VPNs in the same way. Both will use ESP or encapsulating security protocol. Both establish hashes, authentication, the lifetime of the connection, and the encryption standard when the VPN tunnel is created. Remote-access VPNs can also use a XAuth header to identify the specific user.
Are you ready to learn more? Then pull up your chair and watch the video above right now!
-----------------
Connect with CBT Nuggets for the latest in IT training:
#vpn #virtualprivatenetwork #ittraining #cbtnuggets
Комментарии