Book Image

OpenVPN: Building and Integrating Virtual Private Networks

Book Image

OpenVPN: Building and Integrating Virtual Private Networks

Overview of this book

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption. This book is an easy introduction to this popular VPN application. After introducing the basics of security and VPN, the book moves on to cover using OpenVPN, from installing it on various platforms, through configuring basic tunnels, to more advanced features, such as using the application with firewalls, routers, proxy servers, and OpenVPN scripting. While providing only necessary theoretical background, the book takes a practical approach, presenting plenty of examples.
Table of Contents (17 chapters)
About the Author
About the Reviewers

VPN Security

IT security and hence also VPN security is best described by three goals that have to be attained:

  • Privacy (Confidentiality): The data transferred should only be available to the authorized.

  • Reliability (Integrity): The data transferred must not be changed between sender and receiver.

  • Availability: The data transferred must be available when needed.

All of these goals have to be achieved by using reliable software, hardware, Internet service providers, and security policies. A security policy defines responsibilities, standard procedures, and disaster management and recovery scenarios to be prepared for the worst. Understanding maximum damage and the costs of the worst possible catastrophe can give an idea of how much effort has to be spent in security issues. Security policies should also define organizational questions like:

  • Who has the key to the server room when the administrator is on holiday?

  • Who is allowed to bring a private laptop?

  • How are the cables protected?

  • How is a...