This part of GB/T 25068 specifies the security guidelines for using a virtual private network (VPN) to connect to the Internet and to connect remote users to the network. It is built according to the network management guidelines in ISO/IEC 18028-1. This section applies to those responsible for selecting and implementing the technical controls necessary to provide network security when using a VPN, and to network monitoring personnel responsible for subsequent VPN security. This section provides an overview of VPNs, presents VPN security objectives, and outlines VPN security requirements. It gives guidelines for secure VPN selection, implementation, and network monitoring for VPN security. It also provides information on typical technologies and protocols used by VPNs.
GB/T 25068.5-2010 Referenced Document
GB/T 17901.1-1999 Information technology-Security techniques-Key management-Part 1: Framework
GB/T 19715.1 Information technology-Guidelines for the management of IT Security-Part 1:Concepts and models of IT Security
GB/T 25068.3 Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios*, 2022-10-14 Update
GB/T 25068.4 Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways*, 2022-10-14 Update
GB/T 9387.1 Information technology--Open Systems Interconnection--Basic Reference Model--Part 1: The Basic Model
GB/T 9387.2 Information processing systems--Open Systems Interconnection--Basic Reference Model--Part 2: Security architecture
GB/T 9387.3 Information technology.Open Systems Interconnection.Basic Reference Model.Part3:Naming and addressing
GB/T 9387.4 Information processing systems--Open Systems Interconnection--Basic Reference Model--Part 4: Management framework
ISO/IEC 18028-1:2006 Information technology - Security techniques - IT network security - Part 1: Network security management
ISO/IEC 18028-2:2006 Information technology - Security techniques - IT network security - Part 2: Network security architecture
GB/T 25068.5-2010 history
2021GB/T 25068.5-2021 Information technology—Security techniques—Network security—Part 5: Securing communications across networks using virtual private networks
2010GB/T 25068.5-2010 Information technology.Security techniques.IT network security.Part 5:Securing communications across networks using virtual private networks