Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
3.1 Terms defined in other International Standards
3.2 Terms defined in this part of ISO/IEC 18028
4 Abbreviated terms
5 Overview of VPNs
5.1 Introduction
5.2 Types of VPN
5.3 VPN techniques
5.4 Security aspects
6 VPN security objectives
7 VPN security requirements
7.1 Confidentiality
7.2 Integrity
7.3 Authentication
7.4 Authorization
7.5 Availability
7.6 Tunnel Endpoints
8 Guidelines for the selection of secure VPNs
8.1 Regulatory and legislative aspects
8.2 VPN management aspects
8.3 VPN architectural aspects
9 Guidelines for the implementation of secure VPNs
9.1 VPN management considerations
9.2 VPN technical considerations
Annex A (informative) Technologies and protocols used to
implement VPNs
A.1 Introduction
A.2 Layer 2 VPNs
A.3 Layer 3 VPNs
A.4 Higher Layer VPNs
A.5 Comparison of typical VPN protocol security features
Bibliography