VPN NEWS | VPN GUIDES | WEB HOST INDUSTRY REVIEW
find vpn - virtual private network solutions  
Find VPN: BTInet | DataSide

FIND VPN for Monday, June 22, 2009  
What About VPN Security?

The key word in "virtual private networks" is private. The last thing a business wants, is to have sensitive corporate information end up in the hands of some pubescent hacker, or worse, the competition. Fortunately, VPNs are widely considered extremely secure, despite using public networks.

In order to authenticate the VPN's users, a firewall will be necessary. While in the past, firewalls have been a major source of headaches for network administrators, the new generation of firewalls are far simpler to create and maintain. Nowadays, there is a wide variety of hassle-free, prepackaged appliances to keep unwanted packets out of the network. Many "black box" security systems also include some sort of encryption system, although some VPNs do not.

Firewall products for VPNs, such as NetScreen, Watchguard, or NetFortress are often relatively simple, plug-and-play solutions for network security. The system can be connected to as many LANs as needed, keys are exchanged between the two units, and the VPN is complete. However, these solutions can come at a substantial cost, and the right choice will depend on the unique networking and security needs of the company or companies using the network. Generally, if you already own the appropriate equipment and Internet connection, an out-of-the-box solution is not necessary.

All VPNs require configuration of an access device, either software- or hardware-based, to set up a secure channel. A random user cannot simply log in to a VPN, as some information is needed to allow a remote user access to the network, or to even begin a VPN handshake. When used in conjunction with strong authentication, VPNs can prevent intruders from successfully authenticating to the network, even if they were able to somehow capture a VPN session.

Most VPNs use IPSec technologies, the evolving framework of protocols that has become the standard for most vendors. IPSec is useful because it is compatible with most different VPN hardware and software, and is the most popular for networks with remote access clients. IPSec requires very little knowledge for clients, because the authentication is not user-based, which means a token (such as Secure ID or Crypto Card) is not used. Instead, the security comes from the workstation's IP address or its certificate, establishing the user's identity and ensuring the integrity of the network. An IPSec tunnel basically acts as the network layer protecting all the data packets that pass through, regardless of the application.

Depending on the solution used, it is possible to control the type of traffic sent over a VPN solution. Many devices allow the administrator to define group-based filter which controls UP address and protocol/port services allowed through the tunnel. IPSec-based VPNs also allow the administrator to define a list of specific networks and applications to which traffic can be passed.

One downside to IPSec-compliant products, is that they provide access control over the network and transport layers only, and not a great deal of measures to selectively regulate access to individual resources within these hosts. If customers given access to particular company information on a server, for instance, highly selective controls are needed to make sure they access only the information they've been authorized to see.

This type of selective, or unidirectional access, within a VPN is available in some non-IPSec solutions, such as Aventail's SOCKS 5 server. In a unidirectional connection, a two-way trusted relationship is not assumed as it is with tunneled VPNs. With this model, if there is some kind of breach in security, only the destination network is affected. SOCKS 5 is also able to handle virtually any authentication and encryption standards.

Point-to-Point Tunneling Protocol (PPTP) or Layer 2 Forwarding (L2F) are also available, and although only a handful of firewall vendors support these security protocols, they are part of the reason why there is no current universally accepted standard. Although VPN vendors must decide which standard they use, it is the administrators who will eventually decide the outcome of this emerging technology. Because of factors like this, it is all the more important to make a wise, informed decision before purchasing a VPN.

VPN News Headlines




FREE Whitepapers on Leading VPN solution: Fast & Secure - Download them here!

VPN GUIDES, VIRTUAL PRIVATE NETWORK

Get information on VPN, VPN encryption and network security. Our VPN guides provide the information you need about VPN.

Frequently Asked Questions About VPN's
Here are some of the more common questions we receive about VPNs.


What is a Virtual Private Network or VPN?
In a sense, VPNs are similar to wide area networks (WAN) or a securely encrypted tunnel, but that they are able to use public networks like the Internet rather than expensive, private leased lines.


How Do I Choose a VPN Solution
Deciding whether a VPN solution is right for your enterprise, and how you should go about implementing one.


How Does a VPN Actually Work?
The current generation of VPNs is an advanced combination of tunneling, encryption, authentication and access control technologies and services ...


Introduction to VoIP
Simply put, voice over IP (VoIP) technology, or IP telephony, as it is often called, is a system for transmitting telephone calls over data networks.


Benefits of a Virtual Private Network
There are a number of reasons to set up a VPN for remote access, but the biggest selling point by far is the potential cost savings.


Explaining VPN Security
The key word in "virtual private networks" is private. The last thing a business wants, is to have sensitive corporate information end up in the hands of the competition.


About VPN Encryption
Most modern VPNs use some kind of cryptosystem, in order to scramble data into cipher text, which is then decrypted into readable text by the recipient.


Introduction to FreeS/WAN
FreeS/WAN is a Linux implementation of the IPSec security protocol, the basis for VPN technology ...


Explaining Multi-protocol Label Switching (MPLS)
MPLS is not designed to replace IP. Rather, it is designed to add a set of rules to IP so that traffic can be classified, marked and policed ...


 
Privacy | About Us   Copyright 2007 Web Host Industry Review, Inc.