课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

VPNs and VPN concentrators

VPNs and VPN concentrators

- [Instructor] Virtual private networks provide two important security functions to IT administrators. First, site to site VPNs allow the secure interconnection of remote networks, such as connecting branch offices to a corporate headquarters or each other. Second, remote access VPNs provide mobile workers with a mechanism to securely connect from remote locations back to the organization's network. VPN's work by using encryption to create a virtual tunnel between two systems over the internet. Everything that enters one end of the tunnel is encrypted, and then it's decrypted when it exits the other end of the tunnel. From the user's perspective, the network appears to function normally, but if an attacker gains access to traffic between the two secure networks, all they see is encrypted information that they can't read. VPNs require an endpoint on the remote network that accepts VPN connections, and several different devices may serve as VPN endpoints, such as a firewall, router…

内容