Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

VPN Architectures - Looking at the Complete Picture

Black Hat via YouTube

Overview

Explore the complexities of VPN architectures and their integration with enterprise security systems in this comprehensive Black Hat USA 1999 conference talk. Delve into the multifaceted world of VPN protocols, products, and their implementation in various enterprise environments. Learn about the distinctions between Branch Office VPN (BOVPN) and Remote User VPN (RUVPN) planning, and understand the importance of QoS agreements with service providers. Examine crucial aspects of VPN deployment, including firewall integration, internal system accessibility, traffic monitoring, and optimal architectures for different scenarios. Gain insights into the careful balance between VPN functionality and security concerns, covering topics such as IDS system integration, auditing capabilities, and VPN usage management. Through a detailed syllabus, explore VPN basics, performance issues, security measures, and the future landscape of VPN technology.

Syllabus

Intro
VPN Architectures
VPN Utility
Remote Access VPN
Branch Office VPN
Traffic Volume
Egress Utilization
Management Perspectives
NMS Management Station
Unique Requirements
VPN Basics
Architecture: NAT
Performance Issues
Throughput
Reliability
Availability
VPN Security
Security: Authentication
Security: Authorization
Security: Accounting
Security: Policy Management
Security: Confidentiality
Architecture Dependencies
Piloting a VPN
Future VPN Landscape

Taught by

Black Hat

Reviews

Start your review of VPN Architectures - Looking at the Complete Picture

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.