Protected information system link utilizing tunneling, security controls, and endpoint address translation giving the impression of a dedicated line.
Source(s):
NIST SP 1800-21B
under Virtual Private Network
from
CNSSI 4009-2015
NIST SP 800-53 Rev. 5
under virtual private network
from
CNSSI 4009-2015
NIST SP 800-53 Rev. 4
[Superseded]
under Virtual Private Network
from
CNSSI 4009
Protected information system link utilizing tunneling, security controls (see information assurance (IA)), and endpoint address translation giving the impression of a dedicated line.
Source(s):
CNSSI 4009-2015
A virtual network built on top of existing networks that can provide a secure communications mechanism for data and IP information transmitted between networks.
Source(s):
NIST SP 800-113
under Virtual Private Network
A restricted-use, logical (i.e., artificial or simulated) computer network that is constructed from the system resources of a relatively public, physical (i.e., real) network (such as the Internet), often by using encryption (located at hosts or gateways), and often by tunneling links of the virtual network across the real network.
Source(s):
NIST SP 800-82 Rev. 2
under Virtual Private Network (VPN)
from
RFC 4949
A virtual network built on top of existing physical networks that can provide a secure communications mechanism for data and IP information transmitted between networks or between different nodes on the same network.
Source(s):
NIST SP 800-77 Rev. 1
under Virtual Private Network (VPN)
A tunnel that connects the teleworker’s computer to the organization’s network.
Source(s):
NIST SP 800-114
[Superseded]
under Virtual Private Network (VPN)
A logical network that is established at the network layer of the OSI model. The logical network typically provides authentication and data confidentiality services for some subset of a larger physical network.
Source(s):
NIST SP 800-127
[Withdrawn]
under Virtual private network (VPN)
A data network that enables two or more parties to communicate securely across a public network by creating a private connection, or “tunnel,” between them.
Source(s):
NIST SP 800-47
[Superseded]
under Virtual Private Network (VPN)
Virtual network built on top of existing networks that can provide a secure communications mechanism for data and IP information transmitted between networks.
Source(s):
NIST SP 800-77
[Superseded]
under Virtual Private Network