• DISCOVER
  • CREATE
IN-FOCUS
CONCEPTS
PROCESS
ROLES
CONTEXT
RATIONALE
HANDS-ON LAB
CHALLENGE
CONTRIBUTING FACTORS
COURSE OF ACTION
Key Concepts:
  • Strategies for protection of remote network access using a VPN
  • Network architecture necessary for VPN implementation
  • Types of VPN solutions and common protocols used for connectivity and data transport
  • Planning and selecting the best VPN options for an organization

Network Security,
Firewalls, and VPNs

VPN Fundamentals

VPN Fundamentals
Introducing a VPN

A VPN makes a secure network connection over a public telecom infrastructure, such as the Internet, to provide remote access to private networks. A VPN enables organizations to privately transmit sensitive data remotely over public networks.

Think about answers to the following questions. Then, click each question to reveal its answer. Then, click the ACTIVITY button to attempt a simple exercise related to the limitations of a firewall.

  • What are the advantages of a VPN?
  • What are the disadvantages of a VPN?
  • What are the various types of architecture for a VPN connection?
  • What security and privacy issues are associated with a VPN?
Defining a VPN Policy
An organization needs to create VPN policies to ensure that VPNs have appropriate security restrictions such that the VPN policy align with the overall information technology (IT) mission and goals of the organization. Steps involved in defining a VPN policy are listed below. After going through the steps, click the ACTIVITY button to attempt a simple exercise.

The following steps are involved in defining an effective VPN policy:

  • Define enterprise-class security considerations.
  • Define users, groups, and access rights.
  • Create VPN-specific standards, guidelines, and procedures.
  • Define VPN usage concerns and models.

Click the RESOURCES icon to learn more about each of the steps.

Types of VPNs
Using a wrong VPN or a VPN that does not meet your organization's requirements can create security problems. Before selecting a VPN product or technology for your organization, create a detailed requirements document. This should factor in not only the security requirements for the VPN but also business requirements. Click on each type of VPN listed below to know more about it. Then, click the ACTIVITY button to attempt a simple exercise.
  • Hardware-based VPNs
  • Software-based VPNs
  • Owned and outsourced VPNs
VPN Solutions
Organizations use various VPN solutions in enterprise environments. The components of common VPN solutions are listed below. Click on each component to learn more about it. Then, click the ACTIVITY button to attempt a simple exercise.
  • Tunnel-mode VPN
  • Transport-mode VPN
  • Cryptographic protocols
  • Network protocols
  • VPN authentication, authorization, and accountability mechanisms
Strategies to Protect a VPN
A VPN is a security technology, but it might degrade the security parameters associated with a network. Therefore, after the VPN is in place, the organization needs to address a number of additional factors for successful VPN deployment. Think about answers to the following questions related to protecting VPN implementation. Then, click each question to reveal its answer.
  • What is the purpose of various VPN deployment models?
  • What are the security requirements for various VPN hardware devices?
  • What are the security characteristics of VPN architecture?
  • What are common VPN supporting services and protocols?

In this section, you will have an opportunity to practice the concepts and processes that you have explored in this lesson.

The Hands-On Lab provides you with an engaging learning experience that is diagnostic and flexible. Following the instructions provided in the Lab Manual, you will be able to practice the steps IT Security Specialists perform on a daily basis and develop the skills required for effective execution and management of IT Security operations.

In this section, you will have an opportunity to apply what you’ve learned in this lesson in the context of analyzing a business situation. Although simplified, a problem scenario provided here depicts the challenges often faced by professionals in the workplace.

In this interactive case study, you will explore a business situation, review critical information related to the problem discussed in the case, decide on the course of action, and receive a decision analysis summary that discusses the implications of your decision. Once you analyze the impact of your decision, explore alternative solutions to learn about other potential ways to address the issue in the case. Complete your work on the case by submitting the graded assignment that will reflect on your process of analyzing the business situation and defining an appropriate course of action.

You have been working on the Corporation Techs' network project. Your manager now wants to brief you on your next task—the continuation of the assignment based on the Corporation Techs scenario.

Click the image of the manager to get his instructions.

After you have gone through the challenge, navigate to Contributing Factors from the panel at the top of your screen.
Corporation Techs' network is experiencing several VPN connection failures lately. Therefore, we need to create a VPN troubleshooting checklist to deal with the problem. I will send you details by e-mail. All the best!
Contributing Factors
From where can you gather information on this case? Let's find out by clicking the contributing factors. After you have gone through the contributing factors, navigate to Course of Action from the panel at the top of your screen.

Read E-mail

Review Documents

Select the icons from the top to receive additional
information related to the situation

Click here to view the VPN troubleshooting information.
Hi,

As already discussed, you need to create a VPN connectivity troubleshooting checklist for future use.

To create the checklist, use the troubleshooting information in the text sheet. Next, identify the relevant steps involved in the VPN connectivity troubleshooting process. Finally, create a checklist that helps you and others resolve general VPN connectivity issues.
Course of Action
Use the following checklist as a guide to complete this assignment. Note that the tasks that you have completed are already checked in the list.

Tasks

  • Consider the advice of the chief security officer.
  • Review the VPN troubleshooting information.
  • Identify the relevant steps involved in the VPN connectivity troubleshooting process.
  • Create the VPN connectivity troubleshooting checklist.
  • Submit the checklist to your instructor.
At the end of this lesson, you should be able to:
  • Identify the benefits and limitations of virtual private networks (VPNs).
  • Discuss VPN deployment models and architecture and differentiate between a transport-mode VPN and a tunnel-mode VPN.
  • Compare hardware and software VPN solutions and explain VPN protocols and their advantages and limitations.
  • Understand how to define a VPN policy.
In this lesson, you will learn about the advantages and disadvantages of a VPN and the process of defining a VPN policy. You will also explore various VPN solutions. In addition, you will learn about various strategies to protect a VPN.