Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

A brief history of VPNs
IPSec problems
What is a tun interface?
Adding security to the VPN
Reliable and Unreliable protocols
Encapsulating Protocols
Fixing the problem
VPNs and UDP
Enter OpenVPN
User-space Tun/Tap vs. IPSec
IPSec in a nutshell
IPSec limitations
IPSec limitations (continued)
How does a VPN achieve security?
Active Attacks
Replay Attacks
Replay attacks, continued
Replay attacks, continued
Known plaintext attacks
OpenVPN and Cryptography
OpenVPN and keying
Enter public key cryptography
Public key cryptography
Enter the Certificate
The Certificate Authority
CAs Continued«
Cryptography conclusion
OpenVPN Features
OpenVPN Features, continued
OpenVPN¶s 3 tier security model
VPNs and Networking
Bridging Advantages
Bridging Disadvantages
Routing Advantages
Routing Disadvantages
The nuts and bolt of bridging (1)
The nuts and bolt of bridging (2)
VPNs and firewalling
VPNs and firewalling (continued)
Future directions -- OpenVPN 2.0
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 1,311|Likes:
Published by ts.sibe978

More info:

Published by: ts.sibe978 on Mar 10, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 49 are not shown in this preview.
You're Reading a Free Preview
Pages 53 to 65 are not shown in this preview.

Activity (6)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
kyoobum liked this
luyenam liked this
Ivan Pereira liked this
myownservice liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->