MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
6.5 SSL VPN Explained

6.5 SSL VPN Explained

Key Concepts

1. SSL/TLS Protocols

SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are cryptographic protocols designed to provide secure communications over a computer network. These protocols ensure that data transmitted between a client and a server remains encrypted and secure.

Example: Think of SSL/TLS as a secure envelope for letters. Just as a secure envelope protects the contents from being read by unauthorized parties, SSL/TLS protects data from being intercepted and read by hackers.

2. Web-Based Access

SSL VPNs provide web-based access, allowing users to securely connect to a network using a web browser. This eliminates the need for installing additional software on the client device, making it convenient for users to access network resources from anywhere.

Example: Consider web-based access as a universal key. Just as a universal key can open multiple locks without needing different keys for each lock, a web browser can access multiple network resources without needing different software for each resource.

3. Clientless VPN

A clientless VPN is a type of SSL VPN that does not require the installation of a VPN client on the user's device. Instead, users can connect to the VPN using a web browser, which simplifies the setup process and reduces compatibility issues.

Example: Think of a clientless VPN as a self-service kiosk. Just as a self-service kiosk allows users to perform tasks without needing assistance, a clientless VPN allows users to connect to a network without needing technical support.

4. Security Features

SSL VPNs offer robust security features, including encryption, authentication, and access control. These features ensure that only authorized users can access the network and that data transmitted over the VPN is protected from unauthorized access and tampering.

Example: Consider security features as a fortress. Just as a fortress protects its inhabitants from external threats, SSL VPN security features protect network resources from unauthorized access and data breaches.

5. Use Cases

SSL VPNs are commonly used in scenarios where remote access is required, such as telecommuting, business travel, and accessing corporate resources from public networks. They are also used in environments where ease of use and flexibility are important.

Example: Think of use cases as different scenarios in a story. Just as a story has different scenarios, SSL VPNs have different use cases, such as enabling remote employees to access corporate resources securely.