F5 GLOSSARY

What Is a Virtual Private Network (VPN)?

A virtual private network (VPN) is a connection established over a secure connection with an existing network, usually the public Internet, and is secured through authentication and encryption.

What Is a Virtual Private Network?

A virtual private network (VPN) is a method of providing secure remote access. A virtual private network can help prevent unauthorized access to a company’s network and sensitive data. A VPN hides your IP address and makes your connection to the Internet more secure.

Why Are VPNs Important?

VPNs have become a crucial part of many organizations’ security strategies regardless of business size, industry vertical, or geographic location. VPNs provide a way for authorized remote users to gain access to files, databases, and other network applications in a secure manner.

Due to the inherent security risks of the Internet, companies providing remote access and telecommuting choices must protect their private data through a VPN.

An even more secure version of the VPN is the Secure Sockets Layer Virtual Private Network (SSL VPN). An SSL VPN uses the Secure Sockets Layer (SSL) protocol to create a secure and encrypted connection over the Internet. The SSL VPN was created to ensure enhanced security and privacy.

F5 Network's FirePass SSL VPN is an SSL VPN that provides broad application support, scalability, easy installation and use, and the highest standard of integrated end-point security.

How Do Virtual Private Networks Work?

There are many techniques and components for establishing and using a VPN.

  • Point-to-Point Tunneling (PPTP) ­– The Point-to-Point Tunneling protocol (PPTP) profile lets you to configure the BIG-IP system to support a secure VPN tunnel that forwards PPTP control and data connections. You can create a secure VPN tunnel by configuring a PPTP profile, and then assigning the PPTP profile to a virtual server.
  • Site-to-Site – A site-to-site VPN connects two or more networks, such as a corporate headquarters network and a branch office network.
  • Secure Sockets Layer (SSL) –  he Secure Sockets Layer (SSL) protocol is used to create a secure and encrypted connection over a less-secure network, such as the Internet. An SSL VPN uses standard web browsers and technologies, giving users secure remote access to enterprise applications without requiring the installation of separate client software.
  • Transport Layer Security (TLS) – TLS, along with SSL, above, is a standard protocol used for securing stream-based Internet traffic. DTLS is a protocol based on TLS that can support datagram transport, and is well suited to tunneling applications such as VPN.
  • Internet Protocol Security (IPsec) ­– An IPsec VPN uses the standard IPsec mechanism to establish a VPN over the public Internet. An IPsec VPN is most useful for establishing a VPN between fixed endpoints, such as two offices.
  • Layer Two Tunneling Protocol (L2TP) – Layer Two Tunneling Protocol is a tunneling protocol used to support VPNS, or as part of the delivery of services by internet service providers.
  • Multi-Protocol Label Switching (MPLS) – Multi-Protocol Label Switching (MPLS) is a data routing method in that sends data from one node to another based on short path labels rather than long network addresses.

How Does F5 Handle VPNs?

 F5 Network's FirePass SSL VPN is an SSL VPN that provides broad application support, scalability, easy installation and use, and the highest standard of integrated end-point security.

F5 products that work with a VPNAccess Policy Manager

Resources

whitepaper

WHITE PAPER

Connecting the Untethered Employee

Read the white paper ›

case study

CASE STUDY

City of Bellevue Increases Workforce Mobility

Find out how ›

Video

VIDEO

What Is BIG-IP APM?

Get the facts ›