Get the basics about SSL and IPsec VPNs, and use this quick reference to help you explain the differences to your customers. An easy tool, courtesy of SearchSecurity.com, for consultants and VARs trying to build a basis for VPN security
SSL VPNs are inherently less secure than IPsec VPNs. False. While they differ architecturally, both VPNs can be deployed securely -- or poorly. Security builds upon standards and products that implement them, but ultimately depends upon appropriate deployment and sound policy definition.
SSL VPNs can be used anywhere that IPsec VPNs can be used. False. IPsec is generally considered a better solution for site-to-site VPNs, where it better satisfies broad application needs and performance demands. SSL is better suited in scenarios where VPN administrators have no control over client software installation, such as extranet collaboratives or nonwork computers (kiosks and homes).
SSL VPNs are suitable for enterprise-class deployment. True. Some SSL VPN gateways are designed for large-scale deployment. They support high user volume, encryption via hardware acceleration and redundancy through failover and load balancing. Many argue that SSL VPNs are more suitable for large populations because they reduce the cost of software distribution. To meet the needs of different constituencies, many companies will likely end up with both.
IPsec VPNs offer more extensible infrastructure. True. IPsec was designed to secure any IP traffic and is configurable to support any IP application. SSL was designed to secure HTTP and has been successfully extended to secure many other applications. However, extensibility ultimately depends on how an SSL VPN product is designed and performs in production environments.
About the author
As owner of consulting firm Core Competence, Lisa Phifer advises companies regarding security needs, product assessment and the use of emerging technologies and best practices. She has been involved in the design, implementation and evaluation of security and network management products for more than 20 years.
This tip originally appeared on SearchSecurity.com.
This was first published in November 2006