2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet506/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   502   503   504   505   506   507   508   509   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

How VPNs Work
A VPN link can be established over any other network communication connection. This 
could be a typical LAN cable connection, a wireless LAN connection, a remote access 
dial-up connection, a WAN link, or even a client using an internet connection for access to 
an office LAN. A VPN link acts just like a typical direct LAN cable connection; the only 
possible difference would be speed based on the intermediary network and on the connec-
tion types between the client system and the server system. Over a VPN link, a client can 
perform the same activities and access the same resources as if they were directly connected 
via a LAN cable.
VPNs can connect two individual systems or two entire networks. The only difference is 
that the transmitted data is protected only while it is within the VPN tunnel. Remote access 
servers or firewalls on the network’s border act as the start points and endpoints for VPNs. 
Thus, traffic is unprotected within the source LAN, protected between the border VPN 
servers, and then unprotected again once it reaches the destination LAN.


Virtual Private Network 
543
VPN links through the internet for connecting to distant networks are often inexpen-
sive alternatives to direct links or leased lines. The cost of two high-speed internet links to 
local ISPs to support a VPN is often signifi cantly less than the cost of any other connection 
means available.
Common VPN Protocols 
VPNs can be implemented using software or hardware solutions. In either case, there are 
four common VPN protocols: PPTP, L2F, L2TP, and IPsec. PPTP, L2F, and L2TP operate 
at the Data Link layer (layer 2) of the OSI model. PPTP and IPsec are limited for use on IP 
networks, whereas L2F and L2TP can be used to encapsulate any LAN protocol. 
SSL/TLS can also be used as a VPN protocol, not just as a session 
encryption tool operating on top of TCP. The CISSP exam does not 
seem to include SSL/TLS VPN content at this time.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   502   503   504   505   506   507   508   509   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish