X hits on this document

Powerpoint document

Virtual Private Networks (VPN) - page 8 / 21

71 views

0 shares

0 downloads

0 comments

8 / 21

http://sce.uhcl.edu/yang/teaching/.../VPN.ppt

8

VPNs at different OSI layers

Application layer VPNs

Created to “work” specifically with certain applications

Example:

SSL-based VPNs (providing encryption between web browsers and servers running SSL)

SSH (encrypted and secure login sessions to network devices)

Drawbacks:

May not be seamless (transparency issue)

Counter-argument: OpenVPN and SSL VPN Revolution (Hosner, 2004)

The myth that Secure Socket Layer (SSL) Virtual Private Network devices (VPNs) are used to connect applications together is not true. …

A VPN is a site-to-site tunnel. …

There is a terrible misunderstanding in the industry right now that pigeon-holes SSL VPNs into the same category with SSL enabled web servers and proxy servers.

A VPN, or Virtual Private Network, refers to simulating a private network over the public Internet by encrypting communications between the two private end-points. …

A VPN device is used to create an encrypted, non-application oriented tunnel between two machines that allows these machines or the networks they service to exchange a wide range of traffic regardless of application or protocol. This exchange is not done on an application by application basis. It is done on the entire link between the two machines or networks and arbitrary traffic may be passed over it. …”

Document info
Document views71
Page views71
Page last viewedWed Dec 07 23:07:09 UTC 2016
Pages21
Paragraphs353
Words1851

Comments