Skip to main content

Virtual Private Network (VPN)

  • Chapter
  • First Online:
Computernetze und Internet of Things

Zusammenfassung

Virtual Private Networks (VPN) sind eine wichtige Komponente der heutigen Netzkommunikation. Diese speziellen Netze unterscheiden sich in zwei Eigenschaften von herkömmlichen Netzen: VPNs sind virtuell und privat.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Triple-A-System: Authentifizierung (Identität des Clients), Autorisierung (Wird Client zugelassen?) und Abrechnung (Kosten für die Übertragung).

  2. 2.

    Asynchronous Transfer Mode: Spezielle Netze im Hochleistungsbereich, z. B. Internet.

  3. 3.

    Man bezeichnet den verwendeten Algorithmus, den Schlüssel und den SPI-Wert als eine Security Association (SA).

Literatur

  1. W. Simpson. The Point-to-Point Protocol (PPP). RFC 1661 (INTERNET STANDARD), July 1994. Updated by RFC 2153.

    Google Scholar 

  2. W. Simpson. PPP Vendor Extensions. RFC 2153 (Informational), May 1997. Updated by RFCs 5342, 7042.

    Google Scholar 

  3. D. Eastlake 3rd. IANA Considerations and IETF Protocol Usage for IEEE 802 Parameters.RFC 5342 (Best Current Practice), September 2008. Obsoleted by RFC 7042.

    Google Scholar 

  4. D. Eastlake 3rd and J. Abley. IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters.RFC 7042 (Best Current Practice), October 2013.

    Google Scholar 

  5. B. Lloyd and W. Simpson. PPP Authentication Protocols. RFC 1334 (Proposed Standard), October 1992. Obsoleted by RFC 1994.

    Google Scholar 

  6. W. Simpson. PPP Challenge Handshake Authentication Protocol (CHAP). RFC 1994 (Draft Standard), August 1996. Updated by RFC 2484.

    Google Scholar 

  7. G. Zorn. Microsoft PPP CHAP Extensions, Version 2. RFC 2759 (Informational), January 2000.

    Google Scholar 

  8. L. Mamakos, K. Lidl, J. Evarts, D. Carrel, D. Simone, and R. Wheeler. A Method for Transmitting PPP Over Ethernet (PPPoE). RFC 2516 (Informational), February 1999.

    Google Scholar 

  9. G. Gross, M. Kaycee, A. Li, A. Malis, and J. Stephens. PPP Over AAL5. RFC 2364 (Proposed Standard), July 1998.

    Google Scholar 

  10. G. Pall and G. Zorn. Microsoft Point-To-Point Encryption (MPPE) Protocol. RFC 3078 (Informational), March 2001.

    Google Scholar 

  11. G. Zorn. Deriving Keys for use with Microsoft Point-to-Point Encryption (MPPE). RFC 3079 (Informational), March 2001.

    Google Scholar 

  12. S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401 (Proposed Standard), November 1998. Obsoleted by RFC 4301, updated by RFC 3168.

    Google Scholar 

  13. K. Ramakrishnan, S. Floyd, and D. Black. The Addition of Explicit Congestion Notification (ECN) to IP. RFC 3168 (Proposed Standard), September 2001. Updated by RFCs 4301, 6040.

    Google Scholar 

  14. M. Mealling. Dynamic Delegation Discovery System (DDDS) Part One: The Comprehensive DDDS. RFC 3401 (Informational), October 2002.

    Google Scholar 

  15. B. Briscoe. Tunnelling of Explicit Congestion Notification. RFC 6040 (Proposed Standard), November 2010.

    Google Scholar 

  16. C. Kaufman. Internet Key Exchange (IKEv2) Protocol. RFC 4306 (Proposed Standard), December 2005. Obsoleted by RFC 5996, updated by RFC 5282.

    Google Scholar 

  17. P. Eronen and P. Hoffman. IKEv2 Clarifications and Implementation Guidelines. RFC 4718 (Informational), October 2006. Obsoleted by RFC 5996.

    Google Scholar 

  18. C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 5996 (Proposed Standard), September 2010. Updated by RFCs 5998, 6989.

    Google Scholar 

  19. P. Eronen, H. Tschofenig, and Y. Sheffer. An Extension for EAP-Only Authentication in IKEv2. RFC 5998 (Proposed Standard), September 2010.

    Google Scholar 

  20. Y. Sheffer and S. Fluhrer. Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 6989 (Proposed Standard), July 2013.

    Google Scholar 

  21. Inc. OpenVPN Technologies. Openvpn webseite, 2014. http://openvpn.net.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick-Benjamin Bök .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Der/die Herausgeber bzw. der/die Autor(en), exklusiv lizenziert durch Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bök, PB., Noack, A., Müller, M., Behnke, D. (2020). Virtual Private Network (VPN). In: Computernetze und Internet of Things. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-29409-0_11

Download citation

Publish with us

Policies and ethics