1 hour 53 minutes
welcome back to end user BP and Security Course in this mess, Um, I will be talking about types of we peons it. These there are ways to classify them.
So first way to classify weepy ends is, by the way it's implemented that were the way they are. That's a
put their in place. So there are essentially two ways to implement the VPN, and one is to use hardware
and the other is Do suffer.
So if you're using Carver using a networking equipment made by several manufacturers today,
and not many of the make hard Rabi peons, especially the ones that are there to provide several part off VPN because what you can have is a small device that you use on your user side if you move from home, for example.
But if you want something powerful enough to service tens or hundreds of people looking at the same time to the corporate weepy end, and there are just a couple of manufacturers in the world today that can make such a harder or they think the job.
On the other hand, you can have a soft German. She's essentially self brilliance, stolen the server. It can be a physical server so we can run the bare metal. Or
it can be virtualized environment in which you can have a server farm and then you have virtual machines running on it. Then you have one dedicated
to your BPM.
So what are the differences?
Hado runs? Why are, by definition more expensive? But it doesn't have to be case. So when it's not the case, imagine Europe small business owner. And suddenly this whole Corbett 19 epidemics thing forced you to make people work from home.
And then you have you have to invest fully in the equipment. If you would need to buy a server and softer license and old infrastructure there and you have just tanning, please.
It could be more expensive than to buy just a piece of hardware that will service you from your side in the company. And then you just install some kind of client on the PC's and everything is fine. It works so sometimes it can be cheaper.
Also, these things there foster,
uh, but not necessarily. So there is, ah, question mark to this faster as well
What it means that these things work fast. They give you guaranteed speeds because the processor on the device that is handling the encryption is sized perfectly to what the guarantees be this, And if you have link, that is good enough, you will get that speed. So,
uh, it's on the other hand, if you have, ah, patrols environment
on dure running, suffer on you can just add more processing power or more cores or whatever. More memory, more more hard drive space to the server, running yourself or VPN, and then someone can become foster off course you have,
uh, what's a sequestered in a process? Huge chunk off your computing resource is.
But these things
just give you the faster system, so it really depends on my do me by faster.
On the other hand, if you already have the severing several environment on which you would install your software VPN, then the softer VPN can be cheaper because you have already paid for the environment. And if you have, it's a free processing time on the
server farm. Tojust add another virtual machine.
It will be cheaper. You will have to pay just the license for the software, and sometimes you can find the open source, after which is free.
On the other hand, the harbor ones are less flexible but also easier to set up. Why?
Because them, although some VPN software is our brother, simple to set up. If if you're using the hardware one, you just access it through your through its ah based interface
and just do the settings, according to somebody is advice. Usually the manufacturer. You just need to enter some things like your
internal I P addresses what you want.
The people. What is the address range that you will if I p addresses that you will give to people logging into your system and so on? It's on, and if you're actually using it to connect to geographical sides in your in your company, that's even easier to set up. You just need to set up some
protocols and stuff like that. So if you if you know how to. If you are doing this, you already know how to do these things.
So it's rather simple.
Ofcourse, they're less flexible because it's something is not there to be set up some new feature or sub something, then it's not there, so you cannot do it on the other side. If you have a softer based VPN and it simply cannot do some things you need,
you can just switch to another soccer. Okay, there is a thing about licensing and everything but
the cost being taken aside in this argument.
These things, because they're self where they're much more flexible in terms off what do what can you achieve with them?
Also, these things are much more scalable because they said, if you need more power or you need to suddenly accommodate not 50 of remote uses, but 500 to just give more processing power to a virtual machine, and then suddenly it becomes mature much more powerful, so you can scale up things easily,
while if you
are using harbor and the harder device. For example, on your service side provide you we do 100 remote connections, and then you need 120. You need to buy one more device that gives you 1 20 more, but they actually gives you 100 more. The other 80 won't be using,
it's much easier to scale the software we're doing compared to Hard River.
On the other side, hardware is a little bit more safer. Why is it safer? Because when you have ah server than the softer runs on the server and this is additional potential risk. So the software running a VPN kennel to be compromised. So
this this is another thing that
the the harder version is much safer because it's a harvest in there and the okay, probably cannot. They be updated, but it's much more difficult to bypass that than to do something on the server.
So these air two ways to implement European.
Then, based on usage, you have three types. 1st 1 is remote access VPN, which is set up on the server or on the harbor on the corporate side.
And then employees can access it to log into it and toe work from remote locations, which can be home, which can be hotel there on holiday
or some venue if they are on some kind of rent or on the road. Basically, they are
for sales reasons or for support reasons.
They can log in from whatever by five they find, and they then switch on the VPN and they have a safe connection to your system. So in this case, you usually have some kind of agent on a PC, and you have, AH, software or hardware in the company.
Freddie can serve multiple connections, so this is remote access VPN.
Then you have a site to site weepy in, which allows you to connect to different locations toe, say one network
using Internet connection on both sides in a way that it's safe.
And then you have mobile VPN, which is quite similar to the,
uh, remote access VPN, and I will explain the differences in a couple off sides.
So when we talk about remote, creepy and you're just going to a little bit of money, it'll service early there for remote workers
on and users connect a weepy in Gabriel VPN server in the company. Now what is very important is that there is a process off identity authentication, Um uh, in which,
uh, essentially you have to make sure that whoever is logging into your corporate
system has or company system has the rights to do it.
So you it's usually not just password that they said, so it can be.
It can be smart card, plus
being cold, or it can be password plus fingerprint or some kind of the kind of education it's most common today. Spark card. What's been
because these systems are essentially very, very safe. Also, it cannot. It doesn't have to be physical. Smart car. You can have a virtual smartcard suffer inst older on every client PC,
which during installation has the pro goto process of authentication by itself. So
you cannot install these things while your remote. You have to be physically present in the corporate environment connected to the network, usually by wire, not wirelessly.
And then you get everything set up for the first time, and then when you go out, then you have this kind of virtual smartcard.
It usually uses l two TP plus I t sick or SSL or some kind of protocol that is essentially based on This is so.
And it is Theo nly practical Safeway for employees to logging and to browse the Internet and to do anything them while they are not in the office. And it is highly recommended for anybody who has influence in making such decisions to make
VPN connection mandatory so you can log even from unsafe
Ah, place like I don't know, some kind of, you know, Internet Cafe, or just the bar or restaurant, which offers free by five. And even if that free by flies, maybe being monitored or something. You want to establish weeping connections
So the next one is site to site VPN, and it's there to connect physical sites so it can be
that you have to connect to offices of the same company, which is then called Internet, because then they are sharing the same address space everything. Or it can be extra net. For example, if you have a outside company, which is working as a subcontractor on some deal
with you. So you have to put these people in in a way that they can share information
much faster than with some.
What's the sharing services, which are like to change files of things or send emails or whatever, but they're not your company, so they will not get the same address range. Then it's called extra.
They're not easy to implement, although if you're using harder pieces than it's much easier because you have to harbor devices of each and then basically they provide you anything, you just need to set them up
and the focus off the site to site weapons. Not to be flexible, the focus is to provide guaranteed speed link. So if you having Internet on both sides, I don't know 100 megabits per second
and you say Okay, I know I'm going to get some laws, but I need to provide at least 80 megabits per second between those two locations.
Then what? The design construction of Cyprus I creepy in always is that speed that has to be available to people on both sides of old times.
And then you have mobile we peons, which is very similar to weepy in the remote weepy end. The only substantial difference is that when you have a classical removed, 3 p.m.
If person is, for example, working from home and then disconnect from the Internet on that location and goes, I don't know, switches toe mobile connections over the mobile phone,
BBN gets disconnected. And if it's done properly, then the whole thing drops down,
so you have to reconnect if you're having the mobile weepy. And what happens is, for example, using it from your mobile phone and you are in your car and it works So you're connected to repeat and you can receive your mail. You're going for example, to a meeting.
You don't want to miss anything. And then you you exit the car and go to a meeting and you go to the office off what's a customer or partner company?
And then you connect to their by fire, and it immediately switches to the
to that location without breaking your BPM
so you don't have one physical I p address.
What you have is one logical I p address that your device has.
And then there is one layer that basically translates the physical. I'd be addressed that you have at this moment to this logical I p address which Europeans using
So we pian remains connected while you roam from one connection to another, which is really, really important cases. So these are the three types of weepy, and when it comes to how they are set up in what they're used for
and now with the end, there is a short question for you which says, What is the main difference between the remote and mobile weepy end? So it was mentioned just before the possible incident. Mobile weeping more secure mobile VPN loves roaming or mobile We peons foster.
And the correct answer is small by weepy in the loves roaming.
I didn't give you any time and he pause So you can think of the answer because I spoke to it like less than a minute
In this video, I have talked about heartburn software, every peons how they different basically implementation. And then I spoke about three different VP and types based on usage so remote mobile and side to side will be and
and in next lesson, I will be taking talking about infrastructure you need in order to make weepy in work.
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered