BN305 - SSL/TLS VPN Technologies: An In-Depth Literature Review

Verified

Added on  2022/09/18

|6
|926
|72
Literature Review
AI Summary
This literature review provides an overview of SSL/TLS VPN technologies, discussing their significance, implementation, and advantages. It begins by defining VPNs and their role in establishing secure communication channels, highlighting the use of public network infrastructure for private messaging. The review details various VPN implementation protocols, including OpenVPN, PPTP, SSTP, L2TP/IPSec, and IKEv2, and compares SSL/VPN and IPSEC/VPN, focusing on the network layer at which authentication and encryption occur. It also explores the use of Cisco Adaptive Security Appliances and the Internet Key Exchange protocol for creating stable links between remote users. Furthermore, the review discusses the role of VPNs in protecting against hacker exploits by providing end-to-end encryption. It compares SSL/VPN and IPSEC/VPN in terms of connectivity, security control, and applications, and examines Cisco AnyConnect for secure mobile access. Finally, the review presents three free VPN client solutions: Tcpcrypt, Tinc, and SoftEther VPN, highlighting their unique features and functionalities. Desklib offers a wealth of similar resources for students seeking academic support.
Document Page
Running head: LITERATURE REVIEW
Literature Review
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1LITERATURE REVIEW
Significance of VPN
According to [1], the virtual private network (VPN) is mainly used for online
communication. This uses the infrastructure of the public network to physically allow the
connection in. This establishes the private messaging network instead of using the cables. The
value of the organization’s VPN is established between the employees and the stakeholders. This
is the connection between the clients, staffs and specific comments are made by using the VPN
technology.
Implementation of VPN
Once the users click on the provided links that is accessible on the website, the request is
passed to the client server and the corresponding server will get back the correct data. Both
requests are routed through the private server while using the VPN in process. Following VPN
Implementation protocols are available:
OpenVPN
PPTP
SSTP
L2TP / IPSec
IKEv2
Comparison between SSL/VPN and IPSEC/VPN
The key difference between the SSL/VPN and IPSECF/VPN is the network layer at
which the authentication and the encryption are performed. The IPSEC/VPN operates the
Document Page
2LITERATURE REVIEW
network layer and this is used for encrypting the data that is being sent between the two systems,
which the IP addresses identify.
Appliances of Cisco Adaptive Security
The internet key exchange protocol is used by the IPSec for setting up the network
security secure server. According to [2], IPSec tunneling protocols are used by the Adaptive
Security Appliances for creating the stable link between the remote users. The Adaptive Security
Appliances function as tunnel endpoints. This will accept the different packets from the VPN,
and analyzes transfer the packets to the appropriate protection point.
The role of VPN
The hacker exploits protected internet connections. Therefore, the users need to
concentrate on the different approaches, which are used in the antivirus procedures. According to
[3], the VPN creates the end-to-end encryption of all the data sent to the sender. It would cover
the confidential clients and their organization’s details and other documents using the VPN.
Advantages of SSL/VPN over IPSEC/VPN
Features SSL/VPN IPSEC/VPN
Connectivity It connects only the process-
specific User.
The remote host is connected
by this completely to the
whole network
Security Control Further safeguards on the
cycle with further operations.
Wide access to the connection
concerns confidentiality.
Applications It is not able to support all IP It will support all Programs
Document Page
3LITERATURE REVIEW
programs that are based on it.
Also suitable for file sharing,
email and web surfing.
depending on the IP.
Cisco AnyConnect
According to [4], for the entire thing, almost all people are using cell phones for now a
day. This is primarily operations geared towards the Internet. During this type scenario how the
cisco designs the design of anyconnect for the secure access. Any time the user uses the system
to transfer data, the MDM application is attempted and the procedure is followed.
Free VPN Client Solution
Three free VPN client solutions can be: Tcpcrypt: The Tcpcrypt protocol is the unique VPN approach in which the network
access needs no modification, updates to the applications. Tcpcrypt works through
the opportunistic encryption, which ensures that whenever the other end of the
connection is transmitting to Tcpcrypt, the data must be encrypted, and then it may be
interpreted as the clear text. Tinc: Tinc is the open source software. The features of Tinc set the software apart from
the other sopen source VPNs on this list is the number of special functionality that it
provides, including optional compression, encryption, automatic mesh routing as well as
fast development. These features make the software a perfect option for organizations
seeking to build a VPN from other smaller networks, which are far apart.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4LITERATURE REVIEW
SoftEther VPN: SoftEther VPN is one of the most user-friendly and efficient VPN
software solutions in market. This software is positioned as the perfect alternative to
OpenVPN and the SoftEther VPN has the OpenVPN server clone feature that enables the
users to easily switch to SoftEther VPN from OpenVPN. The excellent security features
and functionality of SoftEther are considered competitive with market leading software
like NordVPN by making the software an open source powerhouse.
Document Page
5LITERATURE REVIEW
References
[1] B. Lipp, B. Blanchet and K. Bhargavan, A mechanised cryptographic proof of the WireGuard
virtual private network protocol, In 2019 IEEE European Symposium on Security and Privacy
(EuroS&P) (pp. 231-246), IEEE, 2019, June.
[2] O. Santos, P. Kampanakis and A. Woland, Cisco Next-Generation Security Solutions: All-in-
one Cisco ASA Firepower Services, NGIPS, and AMP, Cisco Press, 2016.
[3] K.K.V. Singh and H. Gupta, A New Approach for the Security of VPN. In Proceedings of the
Second International conference on Information and Communication Technology for
Competitive Strategies (pp. 1-5), 2016, March.
[4] J. Frahim, O. Santos and A. Ossipov, Cisco ASA: All-in-one Next-Generation Firewall, IPS,
and VPN Services, Cisco Press, 2014.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon