Principles of computer networks
Computer network
10.6.1.4 explain the purpose of a private virtual network
Virtual private networks – VPN
The history of VPN
The history of the origin of VPN goes back to the 60s of the last century, when the specialists of the engineering Department of the new York telephone company developed a system of automatic connection of PBX subscribers – Centrex (Central Exchange). In other words, it is nothing but a virtual private telephone network, as already created communication channels were rented, i.e. virtual channels of voice information were created. Currently, this service is being replaced by its more advanced analogue – IP-Centrex.
1998 – development of VPN applications allowing centralized control by users
1999 – authentication model, additional tools for configuring clients 2000 – enabling VPN in Windows2000
Currently, the technology has entered a phase of prosperity. Different technologies and architectures are used to meet the needs of a particular network.
Using the Internet to provide remote access to information can be secure.
Basic architecture of VPN
Basic VPN components
7
The pattern of interaction between provider and client
VPN data protection
Requirements for a secure channel:
VPN support at different levels of the OSI model
Link layer:
VPN selection criteria
Connection type:
–Persistent: IPSec
–Temporary: SSL/TLS
Access type:
–User (company employee): IPSec
–Guest: SSL/TLS
The level of security of the corporate network:
–High: IPSec
–Medium: SSL/TLS
–Depending on the service provided: IPSec +SSL/TLS
Data security level:
–High: IPSec
–Medium: SSL/TLS
–Depending on the service provided: IPSec +SSL/TLS
The scalability of the solution:
–Scalability: IPSec
–Fast deployment: SSL/TLS
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.