Unit 4 Unit 4 - Network Security PDF
Unit 4 Unit 4 - Network Security PDF
2. Site-to-Site VPN
Concept: A Site-to-Site VPN is used to securely connect entire networks, such
as one office location to another. It is typically used by organizations with
multiple branches or remote offices to ensure secure communication
between them.
Usage:
Enables branch offices to securely connect to the central office network, as if
they were on the same local area network (LAN).
Typically used for interconnecting different office locations or data centers
over the internet.
Ensures that sensitive data is encrypted when transmitted between different
locations.
Example: A company with offices in different cities establishes a Site-to-Site
VPN to securely link the office networks, allowing data sharing and
communication.
Usage:
Often used in environments where ease of use and compatibility with older
systems are prioritized over security.
Commonly used for basic, low-risk remote access needs.
Example: Used in older or less secure systems where high-level encryption
isn't needed, such as connecting to an office network from a personal
computer.
Usage:
Suitable for scenarios where better security is needed than PPTP provides.
Commonly used for secure remote access, especially in corporate
environments.
A standard choice for applications that require secure communication over
potentially untrusted networks.
Example: A remote employee connects to a corporate network using
L2TP/IPsec to securely access sensitive files.
5. OpenVPN
Concept: OpenVPN is an open-source, highly configurable VPN protocol that
uses SSL/TLS for encryption. It is known for its flexibility and strong security
features.
Usage:
OpenVPN is widely used for both personal and corporate VPNs because it
provides robust encryption and supports various platforms.
It can operate over UDP (User Datagram Protocol) or TCP (Transmission
Control Protocol), making it adaptable to different network conditions.
OpenVPN can be configured for both remote access and site-to-site VPNs.
Example: A business uses OpenVPN to allow employees to securely access
company resources from remote locations or for connecting offices to each
other.
Firewall: Concept, Types, and Importance
Concept of a Firewall
A firewall is a security system designed to monitor and control incoming and
outgoing network traffic based on predetermined security rules. Its primary
role is to act as a barrier or filter between a trusted internal network and an
untrusted external network (such as the internet), blocking potential threats
while allowing legitimate communications. Firewalls can be hardware
devices, software applications, or a combination of both.
Traffic Filtering: Firewalls filter data packets based on specific criteria (like IP
addresses, ports, or protocols) to allow or block traffic.
Traffic Monitoring: They monitor network activity for unusual or suspicious
behavior and can trigger alerts or automatic actions.
Access Control: They enforce access control policies by restricting which
devices or users can access certain resources.
Types of Firewalls
Packet-Filtering Firewalls:
Description: The most basic type of firewall. It inspects packets of data (basic
units of network communication) to determine if they meet security criteria.
How it Works: It checks the header of each packet, such as the source and
destination IP address, port numbers, and protocol type, to decide whether
to allow or block the packet.
Advantages: Fast and efficient.
Disadvantages: Lacks deep inspection, cannot detect sophisticated attacks
(e.g., application-level attacks).
Stateful Inspection Firewalls:
Description: These firewalls are more advanced than packet-filtering
firewalls. They track the state of active connections and make decisions
based on the context of traffic (state of the connection).
How it Works: It not only examines packet headers but also keeps track of
connection states (e.g., whether a packet is part of an existing connection).
Advantages: More secure than packet-filtering, and can detect a broader
range of threats.
Disadvantages: Can be more resource-intensive.
Proxy Firewalls (Application-Level Gateways):