What technologies are used in UFs VPN system?
UF’s VPN service is based on the open IPsec standard. This is really an “umbrella” standard that dictates everything from exchanging secure keys, to packet formats and types, to the methods of encryption that are used. Other standards such as Diffie-Hillman key exchange, Authenticated Header, Encapsulating Security Payload, Data Encryption Standard/Cypher Block Chaining (DES/CBC), Advanced Encryption Standard (AES) and Internet Key Exchange (IKE) are used as part of the IPsec standard. IPsec is primarily defined in RFC2401. • Why should I use a VPN? By connecting to the VPN service, you assure that the data you transmit will be secure between your host and the UF core network. Once it arrives on campus, it is decrypted and sent in the clear. Furthermore, it allows you to gain access to resources that are restricted based on source address. While you are connected to the VPN concentrator, you appear to other hosts at UF as if you were on the UF network. This also allows you to gain acce
UF’s VPN service is based on the open IPsec standard. This is really an “umbrella” standard that dictates everything from exchanging secure keys, to packet formats and types, to the methods of encryption that are used. Other standards such as Diffie-Hillman key exchange, Authenticated Header, Encapsulating Security Payload, Data Encryption Standard/Cypher Block Chaining (DES/CBC), and Internet Key Exchange (IKE) are used as part of the IPsec standard. IPsec is primarily defined in RFC2401. • Why should I use a VPN? By connecting to the VPN service, you assure that the data you transmit will be secure between your host and the UF core network. Once it arrives on campus, it is decrypted and sent in the clear. Furthermore, it allows you to gain access to resources that are restricted based on source address. While you are connected to the VPN concentrator, you appear to other hosts at UF as if you were on the UF network. This also allows you to gain access to external resources from off c