A Presentation on the Evolution of VPN Replacement Technologies

Verified

Added on  2023/01/04

|9
|525
|2
Presentation
AI Summary
This presentation analyzes the evolution of VPN technologies, starting with legacy VPNs and progressing to modern solutions. It highlights the limitations of legacy systems and the drawbacks of IPsec and SSL VPNs, such as outbound connection issues and potential vulnerabilities. The presentation then explores alternative technologies like DirectAccess and multi-protocol VPNs such as SoftEther and Cisco AnyConnect, emphasizing their advantages in terms of ease of use, resource consumption, and enhanced security features, including cross-platform support and BYOD capabilities. The presentation concludes by forecasting the diminishing role of IPsec-only VPNs and the continued importance of SSL VPNs, while advocating for the adoption of advanced VPN technologies like DirectAccess and multi-protocol VPNs for enhanced network security.
Document Page


A Presentation on VPN
Replacement
VPN Replacement Technologies
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Legacy VPNs like Cisco Systems VPN client, the CITES Nortel VPN and
Aventail SSL VPN used to be industry leading VPNs and got discontinued in
2014.
The two key protocols based on which typical VPNs are available are IPsec
and SSL. Recent IPsec VPNs use dynamic multipoint and MPLS features.
Legacy VPNs were client based VPNs and used IPsec protocol
VPNs based on SSL use web browsers and separate clients are not required.
Other alternatives include multi-protocol VPNs like SoftEther and Cisco
AnyConnect.
Microsoft DirectAccess is a completely different alternative.
Document Page
Document Page
Replacing Traditional VPNs
The VPN market used to be dominated by
legacy VPNs like Cisco Systems VPN client,
the CITES Nortel VPN and Aventail SSL VPN.
With the release of more advanced network
based IPsec and SSL VPNs, the legacy
solutions lost their value and got
discontinued in 2014.
Even the recent IPsec and SSL based VPNs
have their share of drawbacks.
In IPsec outbound connections often get
blocked by firewalls [1].
These drawbacks can be addressed by
Microsoft DirectAccess and multi-protocol
VPNs like Cisco AnyConnect and SoftEther
VPN program.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advantages of Alternatives
The alternate VPNs like DirectAccess
and SoftEther consume less system
resources.
These VPNs can be easy to setup and
configure just like SSL and yet
provides better security.
A range of additional features is
provided by these VPNs like working
in conjunction with Active Directory or
even cloning of other VPN solutions.
SoftEther can provide cross platform
support and BYOD or Bring Your Own
Device functionality.
Document Page
Future Scope
SSL VPNs are easy to use and the
user only requires to enter the
credentials [2].
Thus it will continue to gain wide
scale adoption.
More serious users on network
security require more effective
VPNs.
These role can be filled by Direct
Access, AnyConnect and SoftEther.
There is no role for VPNs that only
use IPsec protocol.
Document Page
Conclusion
The presentation concludes that though legacy VPNs got replaced by
advanced IPsec based and SSL based VPNs, they are still not foolproof.
In IPsec VPNs outbound connections are not always allowed because of
custom ports.
SSL based VPNs can be exploited by a range of vulnerabilities.
Hence alternatives like DirectAccess and multi-protocol VPNs are being
suggested.
VPNs solely based on IPsec have no significant role in the future.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
[1] F.A. Salman, Implementation of IPsec-VPN tunneling using GNS3.
Indonesian Journal of Electrical Engineering and Computer Science, 7(3),
pp.855-860., 2017.
[2] M. Zhang, Study on Remote Access for Library Based on SSL VPN.
International Journal of Control and Automation, 9(1), pp.111-122.,
2016.
Document Page
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]