{"title":"VPN、IPSEC和SSL技术安全与管理的观点","authors":"Abdelmajid Lakbabi, Ghizlane Orhanou, S. El Hajji","doi":"10.1109/NGNS.2012.6656108","DOIUrl":null,"url":null,"abstract":"Mobility has driven the need for secure remote access from more locations, end point devices, platforms and environments. Correspondingly, Virtual Private Network (VPN) technology has quickly changed to meet this need. Increasingly, organizations are upgrading their remote access technology from legacy Internet Protocol Security (IPSec VPNs) to more sophisticated Secure Socket Layer VPN (SSL VPN) solutions. We propose to examine the differences between these VPN technologies and approach the accurate criteria for deciding what technology will fit better for networks access needs. In this paper, we will study VPN IPSEC and SSL VPN to have a clear idea about flexibility and security features that the two technologies offer; then help security managers to make the right decision when comparing both protocols Strengths and Weaknesses from a security and management perspective.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"VPN IPSEC & SSL technology Security and management point of view\",\"authors\":\"Abdelmajid Lakbabi, Ghizlane Orhanou, S. El Hajji\",\"doi\":\"10.1109/NGNS.2012.6656108\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobility has driven the need for secure remote access from more locations, end point devices, platforms and environments. Correspondingly, Virtual Private Network (VPN) technology has quickly changed to meet this need. Increasingly, organizations are upgrading their remote access technology from legacy Internet Protocol Security (IPSec VPNs) to more sophisticated Secure Socket Layer VPN (SSL VPN) solutions. We propose to examine the differences between these VPN technologies and approach the accurate criteria for deciding what technology will fit better for networks access needs. In this paper, we will study VPN IPSEC and SSL VPN to have a clear idea about flexibility and security features that the two technologies offer; then help security managers to make the right decision when comparing both protocols Strengths and Weaknesses from a security and management perspective.\",\"PeriodicalId\":102045,\"journal\":{\"name\":\"2012 Next Generation Networks and Services (NGNS)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Next Generation Networks and Services (NGNS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGNS.2012.6656108\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Next Generation Networks and Services (NGNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGNS.2012.6656108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
VPN IPSEC & SSL technology Security and management point of view
Mobility has driven the need for secure remote access from more locations, end point devices, platforms and environments. Correspondingly, Virtual Private Network (VPN) technology has quickly changed to meet this need. Increasingly, organizations are upgrading their remote access technology from legacy Internet Protocol Security (IPSec VPNs) to more sophisticated Secure Socket Layer VPN (SSL VPN) solutions. We propose to examine the differences between these VPN technologies and approach the accurate criteria for deciding what technology will fit better for networks access needs. In this paper, we will study VPN IPSEC and SSL VPN to have a clear idea about flexibility and security features that the two technologies offer; then help security managers to make the right decision when comparing both protocols Strengths and Weaknesses from a security and management perspective.