Four VPN attack methods and hackers are introduced in "How to Avoid VPN Security Vulnerabilities (I)". This article will continue to introduce you to the security of MPLS VPN; how should enterprises build appropriate VPNs to ensure information security and balance the ease-of-use and security of VPNs.
Can mpls vpn be cracked?
Enders: mpls vpn is a good VPN technology. Of course, common attacks against VPN can also pose a threat to mpls vpn, such as social engineering attacks and internal attacks.
How should enterprises build appropriate VPNs to ensure information security?
Enders: network and information security is a comprehensive and complex system. technical measures are only part of the entire problem. A Comprehensive Security Model must cover three aspects: technical measures, security policies, and communication and training. Each aspect guarantees information security and enhances security awareness.
Enterprises should choose the VPN technology that is good at tracking and recording secure access. IPsec is undoubtedly the best choice. It has manageable clients and firewalls, as well as an integrated VPN system that closely integrates with the identity management system to provide maximum protection. In addition, the implementation of VPN deployment is also very important.
When enterprises seek a VPN solution, is the higher the price, the safer it is?
Enders: network administrators should focus on the overall cost of the VPN System, including the O & M cost and the cost of dealing with potential security vulnerabilities. In addition, the network administrator should consider the upgrade cost and scalability of the solution, and determine whether to support a wide range of application platforms, such as desktop devices and mobile devices, to ensure that their technologies cover all aspects. Because we often encounter a situation where the company has deployed a large number of different technical applications, network engineers must learn more technical knowledge to meet the company's needs. More technical knowledge means more complexity. More complexity usually means more error possibilities. More errors may mean that errors are coming soon, in the end, it means that the enterprise's security level is low. If the user end is forced to use different clients or different access technologies, there will be more errors, which means that the entire enterprise will face higher complexity and less security. This principle is very simple.
Therefore, I sincerely suggest you take a look at the O & M costs and the costs of dealing with potential security vulnerabilities from an overall perspective. Determine the level of security measures that need to be taken, select the most appropriate technology for the various problems exposed, and adopt appropriate methods for implementation.
How should enterprises balance the ease of use and security of VPN?
Enders: ease of use has been ignored too many times. User errors caused by low usability or worse user behavior may affect the overall security level of the solution.
The ease of use of VPN has an important impact on end users and network engineers. High ease of use enables them to spend less time managing VPN in practice, so they can devote more energy to other important related tasks, such as managing firewall rules, monitoring network access, and researching ongoing security topics. In addition, the management of the entire solution should be simple and easy to manage, which is often overlooked. Ease of management can improve the acceptability of the solution and increase ease of use. In general, it can also reduce errors and improve the security of the solution as a whole.
TechTarget original in China