Skip to main content

Virtual Private Network

Updated Jan 30, 2024 ·

Overview

A Virtual Private Network or VPN extends a private network over a public one, and allows secure access to remote networks. This enables users to securely send and receive data.

  • Communication tunnel for point-to-point transmission.
  • With VPN, users can work from remote or different locations.
  • Secures authentication and data traffic over untrusted networks.

Tunneling Protocols

Tunneling protocols encapsulate and encrypt data to ensure confidentiality, integrity, and authentication during transmission.

  • IPSec

    • Operates at the network layer (Layer 3).
    • Supports two modes: Transport mode and Tunnel mode.
    • For more information, please see IPSec
  • Layer 2 Tunneling Protocol (L2TP)

    • Operates at the data link layer (Layer 2).
    • Combines features of PPTP and L2F.
    • Often used with IPSec for secure VPN connections.
  • Secure Sockets Layer (SSL)

    • Establishes secure connections between browsers and servers.
    • Secures HTTP traffic, forming HTTPS.
    • Operates above the transport layer (Layer 4).
    • No longer used.
  • Transport Layer Security (TLS)

    • Upgraded, more secure version of SSL.
    • Operates above the transport layer (Layer 4).
    • Used in HTTPS and other secure protocols like FTPS and IMAPS.
info

TLS VPNs are least susceptible to firewall interference because they typically use port 443, which is the same port used for HTTPS web traffic. This port is commonly allowed full outbound access through firewalls, which makes it more likely that the VPN connection will be successful.

VPN Types

Different VPN types suit different needs for remote access, site-to-site connectivity, or mobile users.

  • SSL VPN

    • Often another name for TLS VPN (TLS replaced SSL).
    • Provides secure browser or lightweight client access.
  • WireGuard VPN

    • Lightweight, modern VPN protocol.
    • Fast, simple, uses strong cryptography.
  • OpenVPN

    • Open-source VPN solution.
    • Supports TCP/UDP, TLS, and pre-shared keys.
  • MPLS VPN

    • Managed by service provider for connecting multiple sites.
    • Encryption not end-to-end by default.
  • Clientless VPN

    • Access via browser only, no installed client.
    • For temporary or limited access to internal apps.
  • Mobile VPN

    • Designed for devices moving across networks.
    • Keeps sessions active when switching Wi-Fi to cellular.
  • IPSec VPNs

    • Secure traffic at the network layer using IPSec.
    • Tunnel mode (site-to-site) or transport mode (host-to-host).
    • See IPSec Modes
  • TLS VPNs

    • Secure traffic at the transport layer using TLS (like HTTPS).
    • TLS portal VPN (web app) and TLS tunnel VPN (full network).
    • See TLS VPNs.

IPSec vs. TLS VPNs

FeatureIPSec VPNTLS VPN
Protocol LayerNetwork layerTransport layer
Typical UseSite-to-site or host-to-host VPNRemote access via browser or client
EncryptionIPSec (ESP/AH)TLS/SSL (HTTPS)
Client RequirementUsually VPN client neededBrowser or lightweight client
Access TypeFull network accessWeb apps(TLS portal VPN) and full network (TLS tunnel VPN)
ConfigurationCan be complexSimpler for end users
ExamplesBranch office site-to-site VPNSecurely access internal apps from anywhere
info

IPSec is strong for network links while TLS VPNs are flexible for users.

TLS VPNs

TLS VPNs use standard web protocols to securely connect users to network resources. There are two types of TLS VPNs: TLS Portal and TLS Tunnel.

This table makes it easy to see that portal VPNs are simpler and more limited, while tunnel VPNs offer broader, more secure network access.

FeatureTLS Portal VPNTLS Tunnel VPN
Access ScopeSpecific web appsFull network access
Traffic CoverageBrowser traffic onlyAll client-to-network traffic
User ExperienceSimple, quick setupRequires client, more flexible
Security LevelLimited to web sessionsEncrypts all traffic
Typical UseAccessing internal apps remotelyRemote access for multiple services

Tunnel Configurations

Both tunnel configurations can be used for site-to-site or client-to-site VPNs.

  • Full Tunnel

    • All network traffic is routed through the VPN.
    • Ensures all internet activity is monitored and controlled.
    • Maximum security, but slower internet speeds due to traffic routing.
    • Ideal for environments requiring strict security.
    • Most organizations used this by default.
  • Split Tunnel

    • Only specific traffic is routed through the VPN.
    • Non-critical traffic uses the local internet connection.
    • Improves internet speed by reducing VPN load.
    • Useful for accessing local resources and internet simultaneously.
    • Requires careful configuration to avoid security risks.

VPN Configurations

VPN configurations ensure secure connections over public networks and come in various forms, including site-to-site, client-to-site, and clientless VPNs.

Site-to-site

Site-to-site VPN connects entire networks, such as branch offices to a central headquarters, providing secure communication between them.

  • Requires a compatible VPN appliance at each site.
  • Commonly used for linking branch offices to headquarters.
  • Secures traffic, but can slow down users due to extra network hops.

Client-to-site

Client-to-site VPN allows individual devices to connect to a remote network securely, often used by remote workers.

  • Requires VPN client software on the user's device.
  • Connects individual devices to a remote network.
  • Ideal for remote or mobile workers.
  • Uses strong authentication and encryption methods.

Clientless

Clientless VPN provides secure access through a web browser without the need for VPN software installation.

  • Provides secure access via a web browser.
  • No need for VPN software installation on client devices.
  • Ideal for temporary or unmanaged devices.
  • Access is typically limited to specific web applications.

VPN Endpoints

VPNs need an endpoint on the remote network to establish and accept VPN connections. Various devices can function as VPN endpoints.

  • Firewalls

    • Secure the network by filtering traffic and enforcing VPN connections.
    • Often used as a VPN endpoint for added security.
  • Routers

    • Direct traffic between networks and can establish VPN connections.
    • Commonly used in small to medium-sized networks as VPN endpoints.
  • Servers

    • Provide remote access by hosting VPN software or services.
    • Suitable for networks needing dedicated resources for VPN management.
  • VPN Concentrators

    • Specialized devices designed to manage multiple VPN connections.
    • Ideal for large-scale environments with high VPN traffic.