Slides on network security and VPN technologies.
Overview of Internet and network security protocols and architectures. Network and Internet security is about authenticity, secrecy, privacy, authorization, non-repudiation, data integrity and protection from denial of service (DOS) attacks. In the early days of the Internet, security was not a concern so most protocols were developed without protection from various kinds of attacks in mind. Careful protection of hosts in a network is therefore of paramount importance. Hosts that need not be reachable from the Internet are typically placed in a protected LAN. Hosts with reachability requirements like mail and web servers are placed in a special network zone called DMZ (DeMilitarized Zone). Firewall functionality ranges from simple port and address filters up to stateful application and deep packet inspection firewalls that provide more protection.
Read More Download PDFVPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality. However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet). VPNs basically hook a network logically into another network so that both appear as one private local network. Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network. VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network. The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.
Read More Download PDFAll Rights Reserved © Peter R. Egli