Security / VPN / Tunneling

This section explores key protocols and technologies that secure communication over untrusted networks. These include encryption, tunneling, and segmentation techniques to ensure data confidentiality and integrity.

Protocol / Tech

Description

Use Case

SSH (Secure Shell)

Secure remote access protocol using encryption and key authentication. Supports tunneling, file transfer, and remote command execution.

Secure remote login to servers and network devices.

IPsec (Internet Protocol Security)

Suite of protocols for securing IP traffic via encryption and authentication. Works in transport or tunnel mode.

Site-to-site or remote-access VPNs.

L2TP (Layer 2 Tunneling Protocol)

Tunneling protocol often combined with IPsec for encryption. Encapsulates PPP frames for VPNs.

Secure remote VPN access.

IKEv2 (Internet Key Exchange v2)

Protocol for setting up security associations in IPsec. Supports fast reconnection and mobility.

Mobile VPNs, secure key negotiation.

VPN (Virtual Private Network)

Encrypted connection over the internet that emulates a private network. Utilizes protocols like IPsec, SSL, OpenVPN.

Remote access to internal networks.

DMZ (Demilitarized Zone)

Network segment exposed to external users but isolated from internal LAN. Hosts public services like web or mail servers.

Hosting internet-facing apps securely.

Firewall

Security system that filters traffic based on rules. Protects networks from unauthorized access.

Enforcing access control between networks.

MACsec (802.1AE)

Link-layer encryption for LAN security. Encrypts Ethernet frames to prevent snooping.

Securing Layer 2 segments in enterprise networks.

RFC: RFC 4251–4254

Main Features:

  • Encrypted remote access to devices and servers

  • Supports tunneling, port forwarding, and file transfers (SCP/SFTP)

  • Key-based authentication and session security

Use Cases:

  • Secure system administration

  • File transfer over insecure networks

Alternative Protocols:

  • Telnet (insecure, legacy)

  • RDP – for graphical remote access

RFC: RFC 4301 (Framework), RFC 4303 (ESP), RFC 2402 (AH)

Main Features:

  • Encrypts and authenticates IP packets

  • Supports transport and tunnel mode

  • Often used in VPNs and secure WAN communication

Use Cases:

  • Enterprise VPNs (site-to-site or remote access)

  • Secure communication between data centers

Alternative Protocols:

  • SSL VPN (OpenVPN, WireGuard)

  • MACsec – for Layer 2 encryption

Standard: Conceptual (uses multiple protocols)

Main Features:

  • Encrypts traffic across public networks

  • Protects identity and location

  • Supports multiple protocols (IPsec, SSL, WireGuard, etc.)

Use Cases:

  • Secure remote access

  • Privacy and bypassing censorship

Alternative Protocols:

  • MPLS VPN (carrier-grade)

  • Zero Trust models

Let us learn more about VPNs:

Jump to “VPN”

RFC: Varies (vendor implementation)

Main Features:

  • Filters traffic using rules and policies

  • Supports stateless and stateful inspection

  • May inspect up to Layer 7 (Next-Gen Firewalls)

Use Cases:

  • Enterprise network protection

  • Access control and segmentation

Alternative Technologies:

  • Access Control Lists (ACLs)

  • Host-based firewalls

Let us learn more about Firewalls:

Jump to “Firewall”