Virtual Private Network (VPN) | Literature Review

Added on -2022-09-18

| 6 pages| 926 words| 72 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 6 pages

Running head: LITERATURE REVIEW
Literature Review
Name of the Student
Name of the University
Author’s Note
1LITERATURE REVIEW
Significance of VPN
According to [1], the virtual private network (VPN) is mainly used for online
communication. This uses the infrastructure of the public network to physically allow the
connection in. This establishes the private messaging network instead of using the cables. The
value of the organization’s VPN is established between the employees and the stakeholders. This
is the connection between the clients, staffs and specific comments are made by using the VPN
technology.
Implementation of VPN
Once the users click on the provided links that is accessible on the website, the request is
passed to the client server and the corresponding server will get back the correct data. Both
requests are routed through the private server while using the VPN in process. Following VPN
Implementation protocols are available:
OpenVPN
PPTP
SSTP
L2TP / IPSec
IKEv2
Comparison between SSL/VPN and IPSEC/VPN
The key difference between the SSL/VPN and IPSECF/VPN is the network layer at
which the authentication and the encryption are performed. The IPSEC/VPN operates the
2LITERATURE REVIEW
network layer and this is used for encrypting the data that is being sent between the two systems,
which the IP addresses identify.
Appliances of Cisco Adaptive Security
The internet key exchange protocol is used by the IPSec for setting up the network
security secure server. According to [2], IPSec tunneling protocols are used by the Adaptive
Security Appliances for creating the stable link between the remote users. The Adaptive Security
Appliances function as tunnel endpoints. This will accept the different packets from the VPN,
and analyzes transfer the packets to the appropriate protection point.
The role of VPN
The hacker exploits protected internet connections. Therefore, the users need to
concentrate on the different approaches, which are used in the antivirus procedures. According to
[3], the VPN creates the end-to-end encryption of all the data sent to the sender. It would cover
the confidential clients and their organization’s details and other documents using the VPN.
Advantages of SSL/VPN over IPSEC/VPN
Features SSL/VPN IPSEC/VPN
Connectivity It connects only the process-
specific User.
The remote host is connected
by this completely to the
whole network
Security Control Further safeguards on the
cycle with further operations.
Wide access to the connection
concerns confidentiality.
Applications It is not able to support all IP It will support all Programs

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this