Yogesh Chauhan's Blog

Steps to Secure a VPN

in Miscellaneous on February 11, 2020

REMEMBER this: Your VPN is only as secure as your authentication method. 

One of the easiest ways to compromise a VPN is by getting the authentication credentials. Users are the weak link in any network. It's easy to manipulate people and get something from them as we see in the daily news and life. All it takes is one user with a password to open a direct connection to your network. 

A best practice is to use two-factor authentication for VPN access.

As you have seen in Google login and many other websites as well. They are pushing users for two-step login.

Two-step login or two-factor authentication is a powerful method for login as it makes difficult for an attacker to break into your network.

This is a method of proving identity using two different authentication factors.

Authentication factors are something you know, something you have, or something you are. 

For Examples:

A smart card (something you have) 

with a PIN (something you know); 

a biometric device (something you are) 

coupled with a password (something you know); 

or a proximity card (something you have) 

that activates a fingerprint reader (something you are).

Regularly check the usage after deploying the VPN

When you notice employees, who are not using the VPN, remove their access. If you see employees who have multiple concurrent connections, you may have a security issue, and should investigate further.

Backup your VPN configuration regularly

This is a good practice for any network equipment, but in the event your VPN hardware fails and needs replacement, you'll want to be able to restore your known working configuration quickly. Rebuilding a VPN configuration from the default settings can be a long and challenging task.

Patch/Update your system regularly

Vendors typically release patches and updates for various reason throughout the life of the product. Sometimes just a quick bug fix, sometimes a security glitch fix. So, keep an eye out and install patches whenever they are available. 

In an ideal environment, you will have a development VPN that you can use to test patches and updates. 

In most environments, you will not have the luxury of a development VPN and will have to test when you implement in production. 

In either circumstance, work closely with your vendor to make sure you receive prompt notice of patches and updates, and establish an operational process and maintenance window to apply patches and updates in a timely fashion.


Most Read

#1 How to check if radio button is checked or not using JavaScript? #2 Solution to “TypeError: ‘x’ is not iterable” in Angular 9 #3 How to add Read More Read Less Button using JavaScript? #4 How to uninstall Cocoapods from the Mac OS? #5 PHP Login System using PDO Part 1: Create User Registration Page #6 How to Use SQL MAX() Function with Dates?

Recently Posted

#Aug 15 Is PHP still good for back-end programming? #Aug 10 How to create a multisite network in WordPress? #Aug 3 How to create a circle that follows a cursor using JavaScript and CSS? #Aug 3 How to make a curtain slider using jQuery and CSS? #Aug 2 How to progressively load images and add a blurry placeholder? #Aug 1 How to create a placeholder loader (throbber) using CSS?
You might also like these
The difference between Class declarations and Class expressions in JavaScriptJavaScriptCanvas Drawing in HTML5HTML:in-range and :out-of-range selector in CSSCSSMicroservices vs Monolithic ArchitectureMiscellaneous3 Types of Arrays in PHPPHPHow to host Google fonts on your server and add them using CSS?CSS