VPN Security Mechanisms
VPN Security Mechanisms
“SECURITY IN
Hh
VPNS”
Gfderwr34rewwsassdddfdddf
Developed by:
Name : REMORAKING
Introduction
I. UNDERSTANDING VPN AND THE NEED FOR SECURITY
IN VPN (4)
Conclusion (10)
Annex (11)
When you attempt to access information from outside the corporate firewall, there is a
security exposure that does not exist when you log on from inside. That is where VPNs
come in play. In fact VPNs are implemented to allow computers or networks to talk to
each other over a transport media that is not secure. To achieve this goal VPNs use a
computer at each of the two or more points on the various ends of the transport media
such as the internet. Each point at the end of the transport media (internet) is called a
Point Of Presence (POP). Therefore the firewall will be configured to allow only certain
type of remote access.
Taking into account these advantages, virtual connection is widely adopted to carry out
all kind of data. That is why VPN is an attractive target to hack.
3. concerns
Security issue is then the main concern in implementing VPNs. In fact VPNs must be
designed and operated under well-thought-out security policies. Organizations using
them must have clear and appropriate security rules. When access goes beyond traditional
office facilities, where there may be no professional administrators, security must be
maintained as transparently as possible to end users.
In sum, VPN is a tunnel designed to securely route data via publics networks allowing
anytime-anywhere access. Due to the high sensitivity of the information carried they
become a privileged target to hacker.
Remora. COMPUTERSHARK.BLOGSPOT.com REMORAKING Page 5
II. Potential vulnerabilities of VPN.
To mitigate the security vulnerabilities, mentioned earlier, these are the security
mechanisms used.
:
Point-To-Point Protocol (PPP) transport IP-based data packets across point-to-point
links. The protocol encapsulates data before transporting it over the link. PPP uses two-
way connection, also referred to as duplex connection.
Point-To-Point Tunneling Protocol (PPTP): an extension of PPP, which allows the use
of Public Switched Telephone, networks (PSTNs) to transmit data.
Layer 2 Forwarding (L2F) protocol: is used for remote access technology. It means a
remote user can access a private network using a single dial up connection. It main asset
is that it supports multiple session simultaneously within the tunnel.
Kerberos is a secret key encryption that is used in client/server environment for secure
authentication between computers. Common implementations of Kerberos include
encrypted communication between client and servers for application like telnet and ftp,
which would otherwise be unsecured. It also distributes the shared secret-key between
computers.