MindMap Gallery VPN overview
Overview of VPN, VPN has high demand for private networks and it is difficult to set up private networks → Virtual private network is a virtual private network. This picture shares the classification, working process, and common technologies of VPN.
Edited at 2023-07-29 15:26:46This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
VPN overview
Demand background
origin
Want to remotely access corporate intranet resources and ensure security
Private network
advantage
High performance, high speed and high security
shortcoming
Low cost performance - too expensive and troublesome
VPN
High demand for private network and difficult to set up private network→Virtual Private Network
Why not use public network? The tcp/ip protocol initially only considered communication issues (phone calls, QQ, WeChat, etc.), but did not consider security issues.
meaning
virtual private network
virtual
temporary
dedicated
Personalized customization
Classification
business
access VPN/point-to-site/access VPN/remote VPN
No encryption, poor scalability
SSL VPN, L2TP, PPTP
station to station
Encrypted, no authentication, no need to download client software
ipsec VPN, sangfor VPN
network level
Application layer
SSL VPN
transport layer
sangforVPN
Network layer
ipsec VPN and GRE
network interface layer
L2TP and PPTP
Note: ipsec VPN and ssl VPN are the most commonly used
work process
Private networks cannot be transmitted over the public network. The export IP must be encapsulated and decapsulated.
Common VPN technologies
tunnel technology
Encryption and decryption technology
Symmetric encryption
Same key - encryption rules
shortcoming
1. Key transmission must be secure and data transmission is not secure. 2. Difficult to manage multiple keys: n(n-1)/2
asymmetric encryption
Public key encryption, private key decryption
public key
Everyone knows the box with the lock
private key
Private key - only you know
Symmetrical vs Asymmetrical
Asymmetric encryption is used for key transmission and symmetric encryption is used for data transmission.
Identity authentication technology
Prevent man-in-the-middle attacks
Prove you are you
Private key signature, public key verification
Data transmission security case
digital signature
Similar to a signature on a book, proving that it is your own book
key envelope
Carrying symmetric keys
Alice certificate
Carrying the public key to prevent the public key from being changed secretly
Public key encryption, private key decryption: decrypt yourself
Private key signature, public key verification: sign and send by yourself to prevent impersonation