Ask a question from expert

Ask now

Virtual Private Network (VPN) | Literature Review

Review existing literatures on VPN technologies and issues, and write a report. Also, install a demo on virtual box or laptop to demonstrate the concept.

6 Pages926 Words72 Views
   

Added on  2022-09-18

Virtual Private Network (VPN) | Literature Review

Review existing literatures on VPN technologies and issues, and write a report. Also, install a demo on virtual box or laptop to demonstrate the concept.

   Added on 2022-09-18

BookmarkShareRelated Documents
Running head: LITERATURE REVIEW
Literature Review
Name of the Student
Name of the University
Author’s Note
Virtual Private Network (VPN) | Literature Review_1
1LITERATURE REVIEW
Significance of VPN
According to [1], the virtual private network (VPN) is mainly used for online
communication. This uses the infrastructure of the public network to physically allow the
connection in. This establishes the private messaging network instead of using the cables. The
value of the organization’s VPN is established between the employees and the stakeholders. This
is the connection between the clients, staffs and specific comments are made by using the VPN
technology.
Implementation of VPN
Once the users click on the provided links that is accessible on the website, the request is
passed to the client server and the corresponding server will get back the correct data. Both
requests are routed through the private server while using the VPN in process. Following VPN
Implementation protocols are available:
OpenVPN
PPTP
SSTP
L2TP / IPSec
IKEv2
Comparison between SSL/VPN and IPSEC/VPN
The key difference between the SSL/VPN and IPSECF/VPN is the network layer at
which the authentication and the encryption are performed. The IPSEC/VPN operates the
Virtual Private Network (VPN) | Literature Review_2
2LITERATURE REVIEW
network layer and this is used for encrypting the data that is being sent between the two systems,
which the IP addresses identify.
Appliances of Cisco Adaptive Security
The internet key exchange protocol is used by the IPSec for setting up the network
security secure server. According to [2], IPSec tunneling protocols are used by the Adaptive
Security Appliances for creating the stable link between the remote users. The Adaptive Security
Appliances function as tunnel endpoints. This will accept the different packets from the VPN,
and analyzes transfer the packets to the appropriate protection point.
The role of VPN
The hacker exploits protected internet connections. Therefore, the users need to
concentrate on the different approaches, which are used in the antivirus procedures. According to
[3], the VPN creates the end-to-end encryption of all the data sent to the sender. It would cover
the confidential clients and their organization’s details and other documents using the VPN.
Advantages of SSL/VPN over IPSEC/VPN
Features SSL/VPN IPSEC/VPN
Connectivity It connects only the process-
specific User.
The remote host is connected
by this completely to the
whole network
Security Control Further safeguards on the
cycle with further operations.
Wide access to the connection
concerns confidentiality.
Applications It is not able to support all IP It will support all Programs
Virtual Private Network (VPN) | Literature Review_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Types of VPN and Encryption Techniques
|13
|2690
|49

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Security in Cryptography | Assignment
|7
|1502
|13

Report on Virtual Private Network 2022
|12
|2383
|26

VPN: Virtual Private Network - Categories, Types, Topology, Advantages, Disadvantages, Components, Protocols, and Benefits
|16
|342
|394

REPORT ON VIRTUAL PRIVATE NETWORK
|12
|1820
|59