Βέλτιστες πρακτικές υλοποίησης VPN
View/ Open
Keywords
Virtual Private Network (VPN) ; Encryption protocols ; Authentication mechanisms ; OpenVPN ; Multi-Factor Authentication (MFA) ; Best VPN implementationAbstract
This thesis focuses on creating an optimal virtual private network implementation. It focuses on the process and research required to select the appropriate tunneling protocols, encryption protocols, and security mechanisms by analyzing today's most widely used and trusted options. The study aims to address the question of how an organization or a user can achieve the optimal VPN implementation that meets and exactly fits the organization's requirements or needs respectively. In terms of methodology, diplomacy takes a multifaceted approach starting with a theoretical framework that includes a detailed description of encryption protocols, authentication mechanisms, tunneling protocols, event logging access control policies as well as secure device setup. The research through its analysis continuously highlights the critical importance of choosing the appropriate protocols and security mechanisms to achieve the optimal implementation of a virtual private network. By providing information and analyzing all the necessary steps, the theoretical part of the research can be used as a guide to choose an optimal virtual private network implementation. The methodology continues with a practical part where a virtual private network was implemented for an individual user using OpenVPN protocol. In terms of security measures, multi-factor authentication was used using a mobile device as well as SSH key-only access. The practical implementation is detailed step by step and screenshots are provided at each step intentionally so that the process is easy to reproduce.