logo

VPN: Hardware vs Software, Operation, and Security Protocols

   

Added on  2022-12-20

20 Pages4092 Words72 Views
Abstract
A VPN is a private network which connects two or more computers on a private network and it can
communicate over a public network securely. Operation on VPN can be both on hardware VPN and
also software VPN. Hardware VPN is mainly found in processors and it facilitates functionalities
such as encryptions, authentications and also act as a firewall. It enhances security to the systems. It
is more expensive but very useful. Software VPN is well-designed software which provides security
to the systems. They are relatively cheap because you can buy one software and install them on
several computers. They both have the same purpose but function in different ways (Sehgal et al,
2019 pp. 181-190).
Introduction
VPN is widely used and very popular VPN protocol in a very good reason. It is tipped to be most
secure and uses the most popular open source OpenSSL library for data and traffic encryptions. It is
also a very flexible protocol since it can use both TCP or UDP port hence very hard to block.
OpenVPN is an open source software where all operating systems can utilize it. In Linux operating
systems, it enhances security features that are already built in the system hence making it be the best
compliment to the OS. Its flexibility also comes where it has its own build in custom servers where
the public network cannot interrupt in any way. It is very easy to install in Linux just by following
few commands and the software is fully installed and ready to function. It also requires
professionals to configure properly to avoid vulnerabilities (SLUTSKER, and ALBESA, Cisco
Technology Inc, 2019).
VPN: Hardware vs Software, Operation, and Security Protocols_1
Literature Review
Operation on VPN can be both on hardware VPN and also software VPN. Hardware VPN is mainly
found in processors and it facilitates functionalities such as encryptions, authentications and also act
as a firewall. It enhances security to the systems. It is more expensive but very useful. Software
VPN is well-designed software which provides security to the systems. They are relatively cheap
because you can buy one software and install them on several computers. They both have the same
purpose but function in different ways. VPN mainly function is to provide security in the network.
It utilizes the techniques of digital certificates to provide authentications and encryption of data
hence it enhances the integrity and confidentiality of the data to the users and most importantly to
the company's because most communications are done there. In VPN development, IPSec protocol
is an essential additional feature which enhances the security services of the IP packets such as data
encryption, authentications and avoids a replay of data. IPSec protocol, therefore, can operate in
two different modes such as tunnel mode and operation mode depending on the network topology
and main purpose of the VPN. IPSec tunnel will ensure the safe passage of the data through the
network by providing encryption of the data of end to the end user. IPSec operation mode will
ensure on the other hand that the data send to the public is secured and hence it will reach the
receiver safely without any interruption (Matthews, and Deb, Amazon Technologies Inc, 2019).
VPN: Hardware vs Software, Operation, and Security Protocols_2
Virtual Private Networks (VPN) services
Virtual Private Network (VPN) is basically connections of two or more machines using point-to-
point private connection techniques over the public internet or a shared network. VPN is a widely
used technology by many organizations to connect their remote users, branch offices and other
related facilities within their network connections. VPN is the very secured type of network since it
encrypts connections over a less secure network which turns the internet into the simulated private
network (WAN) (Lambeth, Dalal, DEIANOV, and Xiao Nicira Inc, 2019).
a) VPN Operation, architecture, and techniques
Architecture
VPN has several architectures which serve different functions and they are mainly chosen according
to the traffic you want to transmit. Multi-protocol Label Switching (MPLS) VPNs is an architecture
which sends site-to-site VPN using. It utilizes the Border Gateway Protocol signaling to isolate
traffic hence it can be used to distribute information between the company. It also provides security
by encrypting the data. It can be configured either in star or full mesh topology. Internet Protocol
Security (IPsec) VPN is another type which comes with security support features to protect data as
it travels either in a public or private IP network. Security such as encryption and authentications
are assured for data confidentiality and integrity hence the users will have their data being protected
safely. Secure Sockets Layer (SSL) VPNs is another type which mainly provides remote access on
web browsers to the user's applications. It uses digital certificates for authentications to sent the data
traffic on the web browser. SSL VPNs offers flexible remote access (Davie, B., Nicira Inc, 2019).
Operation
Operation on VPN can be both on hardware VPN and also software VPN. Hardware VPN is mainly
found in processors and it facilitates functionalities such as encryptions, authentications and also act
as a firewall. It enhances security to the systems. It is more expensive but very useful. Software
VPN is well-designed software which provides security to the systems. They are relatively cheap
because you can buy one software and install them on several computers. They both have the same
purpose but function in different ways (Lee et al, 2019 pp.1-10).
Techniques
VPN mainly function is to provide security in the network. It utilizes the techniques of digital
certificates to provide authentications and encryption of data hence it enhances the integrity and
confidentiality of the data to the users and most importantly to the company's because most
communications are done there (Berger, Hopps, Lindem, Bogdanovic, and Liu, 2019).
VPN: Hardware vs Software, Operation, and Security Protocols_3
b) VPN Methods And Mechanisms
A VPN is a private network which connects two or more computers on a private network and it can
communicate over a public network securely. It exists in both LAN and WAN network hence it
makes it more reliable and commonly used nowadays because it is an advancement. Hackers cannot
hack then network because of it virtual and practically invisible hence it will be difficult to gain
access into it. Site-to-site VPN uses VPN hardware on the remote server and remote access VPN
utilizes software VPN to ensure that the client is secured and encrypted on the network. VPN
connections can also have possibility extending physical boundaries of a network to access all the
resources on the private network. Even though they are somehow limited by the public network
bandwidth on their performance. Traffics are encrypted on both ends hence only authorized users
can access the data even if it travels in public networks. It useful when the users need a network to
access remotely while there is no other better option (Bruneo et al, 2019 pp. 237-250).
c) VPN Setting up and Configuration in Ubuntu
A VPN is a private network which connects two or more computers on a private network and it can
communicate over a public network securely. In our scenario we would like to connect VPN using
Ubuntu (Means, AT&T Intellectual Property I LP, 2019):
Step 1: Settings
Click the Network Manager icon and then Edit Connections.
VPN: Hardware vs Software, Operation, and Security Protocols_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Applications and Significance
|8
|1128
|307

Security in Cryptography | Assignment
|7
|1502
|13

ICTNWK410 Install Hardware to a Network
|20
|3587
|421

Importance of VPN in Organizations
|21
|2348
|481

VPN Network Design for SME
|11
|765
|445

Network Infrastructure Component 2022 Report
|10
|2182
|17