x32x01
  • by x32x01 ||
With growing numbers of individuals working remotely in pandemic of Covid-19, telecommuting or traveling with increasing frequency, the traditional business security model continues to evolve. With the advent of widely available high-speed Internet access coupled with VPN technologies; the secure, clearly defined perimeter many organizations like PrivacySharks once enjoyed becomes a bit less distinct.

Virtual Private Networks are implementations of cryptographic technology which is a private and secure network connection because all network traffic between these machines passes through this “virtual” tunnel.

Virtual private networks (VPN) are used by remote clients to securely connect to company networks.

Types of VPNs​

  1. WAN VPN – Branch Offices
  2. Access VPN – Roaming Offices
  3. Extranet VPNs – Suppliers and Customers
To evade the prying eyes of governments, hackers, and Internet Service Providers (ISPs), the use of a VPN and email encryption is integral. Both of these services encrypt your online data, ensuring that no third parties can see it.

Why VPN​

Virtual Private Network (VPN) connections can be an effective means of providing remote access to a network; however, VPN connections can be abused by an adversary to gain access to a network without relying on malware and covert communication channels.

See more on VPNSurfers to protect yourself from being hacked online.

In the most common implementation, a VPN allows a user to turn the Internet in private network. As you know, the Internet is anything but private. However, using the tunneling approach an individual or organization can set up tunneling points across the Internet and send encrypted data back and forth, using the IP-packet-within-an-IP-packet method to transmit data safely and securely.
A VPN can also be used to ensure the identity of the participating machines.

VPN Security​

  • User accounts for VPN connections should be separate from standard user accounts.
  • Multi?factor authentication should be used for VPN connections.
  • Device authentication ensures that a device establishing a VPN connection is approved for such purposes.
  • VPN termination points should be within a DMZ to allow for the proper inspection and auditing of unencrypted VPN traffic prior to entering and leaving a network.
  • Devices accessing a network via a VPN connection should disable split tunnelling.
  • To prevent unauthorized connection, a whitelist of approved MAC or IP addresses should be implemented.
  • Effective logging and log analysis of VPN connections is vital to accounting for activities performed on a network.

A list of famous VPN Tunneling Protocols:​

  • GRE: Generic Routing Encaptulation (RFC 1701/2)
  • PPTP: Point-to-point Tunneling Protocol
  • L2F: Layer 2 forwarding
  • L2TP: Layer 2 Tunneling protocol
  • ATMP: Ascend Tunnel Management Protocol
  • DLSW: Data Link Switching (SNA over IP)
  • IPSec: Secure IP
  • Mobile IP: For Mobile users

VPN Acronyms:​

No.AbbreviationFull Name
1AAAAuthorization, Accounting, and Auditing
2AFTAutomatic Firewall Traversal
3AHAuthentication Header
4ATMPAscend Tunnel Management Protocol
5AVPAttribute-Value-Pair
6CACertification Authority
7CASTCarlisle Adams and Stafford Tavares
8CBCCipher Block Chaining
9CERTComputer Emergency Response Team
10CFBCipher feedback
11CHAPChallenge Handshake Authentication Protocol
12CRCCyclic Redundancy Check
13DESData Encryption Standard
14DHCPDynamic Host Configuration Protocol
15DLSWData Link Switching (SNA over IP)
16DMZDemilitarized Zone
17DNSDomain Name Service
18DSADigital Signature Authorization
19DTSDigital Timestamp Service
20EAPExtensible Authentication Protocol
21ECBElectronic code blocks
22ESPEncapsulating Security Protocol
23GREGeneric Routing Encaptulation
24HTTPHypertext Transfer Protocol
25IDEAInternational Data Encryption Standard
26IETFInternet Engineering Task Force
27IKEInternet Key Exchange
28IMPsInterface Message Processor
29IPSecInternet Protocol Security
30IPXNetware IP
31IPv4IP version 4
32ISAKMPAssociation Key Management Protocol
33ISPInternet Service Provider
34IVPNIP VPN
35JAVAJust Another Vague Acronym
36KMIKey Management Infrastructure
37L2FLayer 2 Forwarding Protocol
38L2TPLayer 2 Tunneling protocol
39LDAPLightweight Directory Protocol
40MACMessage Authentication Code
41MD2Message Digest 2
42MD4Message Digest 4
43MD5Message Digest 5
44MPLSMultiprotocol Label Switching
45MPPEMicrosoft Point to Point Encryption
46MS-CHAPMicrosoft CHAP
47NASNetwork Access Server
48NATNetwork Address Translation
49NBSNational Bureau of Standards
50NDSNetware Directory Service
51NISTNational Institute of Science and Technology
52NSANational Security Agency
53NT5Windows NT 5.0
54OFBOutput feedback
55OTPOne-Time Password
56PAPPassword Authentication Protocol
57PIXPrivate Internet Exchange
58PKIPublic key infrastructure
59PPPPoint-to-Point protocol
60PPTPPoint-to-point Tunneling Protocol
61RADIUSRemote Authentication Dial-in User Service
62RASRemote Access Services
63RC2Ron’s Code 2
64RC4Ron’s Code 4
65RC5Ron’s Code 5
66RFCRequest for Comment
67RSVPResource Reservation Protocol
68S/WANSecure Wide Area Network
69SHASecure Hash Algorithm
70SKIPSimple Key Exchange Internet Protocol
71SNASystem Network Architecture
72SNMPSimple Network Management Protocol
73TACACSTerminal Access Controller Access System
74TCPTransport Control Protocol
75TLSTransport Level Security
76UDPUser Datagram Protocol
77VPDNVirtual Private Data Network
78VPNVirtual Private Networks
79WANWide Area Network
80WFQWeighted Fair Queueing
81WFWWindows for Workgroup
82WREDWeighted Random Early Drop
83XTACACSExtended TACACS
 
Last edited:

Similar Threads

x32x01
Replies
0
Views
90
x32x01
x32x01
x32x01
Replies
0
Views
77
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
212
x32x01
x32x01
x32x01
Replies
0
Views
101
x32x01
x32x01
x32x01
Replies
0
Views
116
x32x01
x32x01
TAGs: Tags
internet security vpn vpn security

Register & Login Faster

Forgot your password?

Latest Resources

Forum Statistics

Threads
517
Messages
518
Members
45
Latest Member
Tacola
Back
Top