logo

SSL/TLS VPN Technologies for Secure Network Connection

Review existing literatures on VPN technologies and issues and write a report.

8 Pages2000 Words419 Views
   

Added on  2022-11-18

About This Document

This report evaluates the significance of VPN and the integration of secure protocols for improving network security. It compares SSL/VPN and IPSEC/VPN and discusses the advantages and disadvantages of each. The report also discusses the process of authentication and access control, confidentiality and integrity, VPN client software options, and protection against replay attacks.

SSL/TLS VPN Technologies for Secure Network Connection

Review existing literatures on VPN technologies and issues and write a report.

   Added on 2022-11-18

ShareRelated Documents
Running head: VIRTUAL PRIVATE NETWORKS
Assignment 1 – SSL/TLS VPN Technologies
Name of the Student
Name of the University
Author’s Note
SSL/TLS VPN Technologies for Secure Network Connection_1
1
VIRTUAL PRIVATE NETWORKS
Introduction
The significance of VPN is described for its application in the organization and
the other secure protocols that can be integrated with VPN for improving the
security is evaluated for improving the security of the network framework. The
advantages and disadvantages of SSL/VPN and IPSEC/VPN is given in the report and
compared for finding the best approach that can be applied in the business
framework.
Authentication and Access Control
The authentication and access control is needed to be managed while
establishment of a secured network connection between the web server and the
browser. A Hello message is sent between the SSL or TLS client and it lists the
version of SSL or TLS and different cryptographic information for finding the cipher
suit that the client supports. A random byte string is embedded is also sent for
sending computing subsequently. A data compression method can also be included
that the client supports. The TLS or SSL server responds to the client with server
hello containing the cipher suite selected by the server from the list provided by the
client, random byte string and session ID [7]. A digital certificate is also sent by the
server in case the server needs a digital certificate for authenticating the client. A
client certificate request is made by the server including the type of certificate that
are supported and the name of the acceptable certification Authorities.
SSL/TLS VPN Technologies for Secure Network Connection_2
2
VIRTUAL PRIVATE NETWORKS
A verification is done by the TLS or SSL client for performing a verification on
digital certificate. The client is needed to send a random byte string such that it can
help in computing the secret key for encrypting the communication channel. The
server’s public key is used for the encryption of the random byte string. When the
TSL or SSL server sends a certificate request the encryption works with the help of
the client private key and the digital certificate [2]. A verification is done on the
client certificate by the server and a finished message is sent by the client which is
also encrypted with secret key indicating that the handshake of the client part is
completed.
The TLS or SSL server also sends a finished message encrypted with secret
key indicating that the handshake of the server part is completed. Thus a session is
created and the client and server can exchange symmetrically encrypted messages
using shared keys within this session.
SSL VPN is used for protecting the integrity and confidentiality of
communication between different systems. It is applied between any endpoints for
acting as a gateway for the VPN architecture. For the remote access SSL VPN finds
its application and here a single VPN gateway in an organization and multiple clients
such as desktop, smartphone, tablet, etc. that is used for accessing the network
using the gateway [9].
A dedicated SSL VPN appliance is not required for SSL VPN because the next
generation firewalls and products of unified threat management has support of SSL
VPN. Thus any organization which has UTM or NGFM installed can have the leverage
for supporting SSL VPN. The remote access infrastructure and the security
requirement is needed to be evaluated for the determining whether SSL VPN can be
beneficial for its business. For improving the security the users are needed to be
authenticated multiple times with the use of multifactor authentication [1]. RADIUS
server can be used and it can be linked with cryptographic token provided to the
users of multifactor authentication systems for the management of access.
Confidentiality and Integrity Process
During the process of authentication between the client and the server data
is needed to be encrypted with a key as an asymmetric key pair and it can be
decrypted with other pair of key. For management of the integrity a message digest
SSL/TLS VPN Technologies for Secure Network Connection_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
TLS/SSL Handshake with RSA and DHE - Desklib
|16
|2305
|399

SSL Handshake: A Process for Secure Communication between Client and Server
|5
|774
|344

Advanced Network Security: Cryptography, Access Control, Firewalls, and Wireless Network Security
|11
|1783
|206

SSL/TLS VPN Technologies
|7
|1361
|55

VPN Technologies and Security
|9
|2031
|99

Wireshark Lab: SSL v7.0
|15
|2052
|219