{"id":1328,"date":"2020-09-15T16:06:55","date_gmt":"2020-09-15T14:06:55","guid":{"rendered":"https:\/\/pragma-security.com\/?p=1328"},"modified":"2023-11-13T18:22:38","modified_gmt":"2023-11-13T17:22:38","slug":"securiser-vpn-teletravail","status":"publish","type":"post","link":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/","title":{"rendered":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b"},"content":{"rendered":"<h2>Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?<\/h2>\n<p>Publi\u00e9 15 Septembre 2020&nbsp;<\/p>\n<p>La situation sanitaire que nous connaissons depuis plusieurs mois a bouscul\u00e9 la grande majorit\u00e9 des entreprises vers la mise en place soudaine du t\u00e9l\u00e9travail. Dans ce nouveau cadre, les entreprises continuent leur activit\u00e9 en demandant \u00e0 leurs collaborateurs de se connecter \u00e0 distance \u00e0 un r\u00e9seau priv\u00e9 pour acc\u00e9der aux ressources et syst\u00e8mes internes.<\/p>\n<p>Toutefois, dans la pr\u00e9cipitation de cette impl\u00e9mentation, les attaquants voient l\u2019opportunit\u00e9 de tester les failles de ces acc\u00e8s au travers d\u2019attaques et de demandes de ran\u00e7ons sur une cible d\u2019entreprises \u00e9tendue.<\/p>\n<h4><b>Votre \u201cVirtual Private Network\u201d VPN peut-il \u00eatre qualifi\u00e9 de \u201cVery Protected Network\u201d?<\/b><\/h4>\n<p>Si les e-commerces et les soci\u00e9t\u00e9s h\u00e9bergeant leurs vitrines virtuelles sont bien souvent les victimes de choix des attaques par d\u00e9ni de service (DDoS), risquant une perte de revenu substantielle en cas d\u2019indisponibilit\u00e9 de leurs sites, ces entreprises ne sontcependant pas les seules vis\u00e9es par les attaquants.<\/p>\n<p>Ce contexte actuel si particulier met en lumi\u00e8re un autre talon d\u2019achille en cybers\u00e9curit\u00e9, cette fois-ci commun \u00e0 l\u2019ensemble des entreprises ind\u00e9pendamment de leur type d\u2019activit\u00e9: celui de voir leurs op\u00e9rations interrompues par manque d\u2019acc\u00e8s \u00e0 leurs e-mails, intranets et autres syst\u00e8mes informatiques lors d\u2019une attaque contre leurs VPNs.&nbsp;<\/p>\n<p>Les VPN sont des \u00e9l\u00e9ments fragiles car ils sont expos\u00e9s sur Internet. Les organisations cybercriminelles peuvent facilement lancer des attaques, puisque celles-ci sont peu co\u00fbteuses, bien moins que de produire un logiciel de ransomware pour une efficacit\u00e9 similaire.<\/p>\n<h4><b>Mettre l\u2019accent sur votre premi\u00e8re ligne de d\u00e9fense<\/b><\/h4>\n<p>En tant que porte d\u2019entr\u00e9e principale de vos syst\u00e8mes internes, l\u2019acc\u00e8s VPN de votre entreprise se doit d\u2019\u00eatre robuste.&nbsp;<\/p>\n<p>Pour prot\u00e9ger les sites et \u00e9quipements sur Internet, deux options majeures sont \u00e0 la disposition des RSSI et responsables informatiques:<\/p>\n<p><img decoding=\"async\" width=\"1500\" height=\"750\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2020\/09\/Pragma-Security-DDoS-Reverse-proxy.png\" alt=\"\" loading=\"lazy\"><\/p>\n<ul>\n<li><b>Reverse Proxy<\/b><\/li>\n<\/ul>\n<p>La m\u00e9thode classique consiste \u00e0 utiliser un reverse proxy. Tout trafic, qu\u2019il vienne d\u2019un utilisateur l\u00e9gitime ou d\u2019une attaque, emprunte le proxy, et ce dernier sera l\u2019unique interface communiquant avec vos serveurs. Les adresses IP de vos serveurs ne sont pas joignables en direct par les attaquants. Cette solution est largement utilis\u00e9e pour prot\u00e9ger les sites WEB ou API. La technologie de proxy anti-DDoS de notre partenaire Qrator Labs assure la s\u00e9paration du bon grain de l\u2019ivraie.<\/p>\n<ul>\n<li><b>Proxy en NAT-T<\/b><\/li>\n<\/ul>\n<p>Dans le cas d\u2019une protection en proxy NAT-T, un tunnel GRE et un circuit de niveau 2 sont \u00e9tablis entre votre entreprise et le r\u00e9seau de protection, en l&rsquo;occurrence QRator Labs, notre partenaire qui propose la solution depuis de nombreuses ann\u00e9es.&nbsp;<\/p>\n<p><img decoding=\"async\" width=\"1500\" height=\"750\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2020\/09\/Pragma-Security-DDoS-VPN-Nat-T-proxy.png\" alt=\"\" loading=\"lazy\"><\/p>\n<p>Au travers de l\u2019attribution d\u2019adresses IP anycast, nous laissons l\u2019ensemble des flux traverser tout en faisant le tri entre le trafic VPN l\u00e9gitime et le trafic d\u2019attaques. Les flux d\u2019attaques flooding ou par amplification n\u2019atteignent pas vos passerelles de VPN. Ce dispositif est transparent et pr\u00e9sente \u00e9galement l\u2019avantage d\u2019une haute disponibilit\u00e9 de vos ressources gr\u00e2ce \u00e0 l\u2019\u00e9tendue du r\u00e9seau QRator Labs, d\u00e9ploy\u00e9 en 13 centres de nettoyage dans le monde.<\/p>\n<p>En outre, cette solution fonctionne parfaitement avec les technologies VPN actuellement utilis\u00e9es sur le march\u00e9 \u00e0 savoir:<\/p>\n<ul>\n<li>IPSec protocol suite (IKEv2, AH, ESP, NAT-T)<\/li>\n<li style=\"font-weight: 400;\">SSL VPN (like OpenVPN)<\/li>\n<li style=\"font-weight: 400;\">Cisco AnyConnect<\/li>\n<\/ul>\n<h3><b>\u00c9tudions votre cas ensemble<\/b><\/h3>\n<p>Nous sommes \u00e0 votre \u00e9coute et \u00e0 votre disposition pour \u00e9tablir le dispositif de protection VPN avec une semaine de test offert sans engagement.<\/p>\n<p>Notre \u00e9quipe est r\u00e9active et peut d\u00e9ployer la solution sur des VPNs d\u00e9j\u00e0 en production en cas d\u2019urgence.&nbsp;<\/p>\n<p>Chaque entreprise ayant ses propres sp\u00e9cificit\u00e9s, Pragma Security propose \u00e9galement un panel de services compl\u00e9mentaires dans le but de renforcer et maintenir la haute disponibilit\u00e9 de vos sites, applications et ressources.&nbsp;<\/p>\n<p><a href=\"mailto:bonjour@pragma-security.com\" role=\"button\"><br \/>\nPrendre contact avec notre \u00e9quipe<br \/>\n<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail? Publi\u00e9 15 Septembre 2020&nbsp; La situation sanitaire que nous connaissons depuis plusieurs mois a bouscul\u00e9 la grande majorit\u00e9 des entreprises vers la mise en place soudaine du t\u00e9l\u00e9travail. Dans ce nouveau cadre, les entreprises continuent leur activit\u00e9 en demandant \u00e0 leurs collaborateurs de se connecter \u00e0 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b - Pragma Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b - Pragma Security\" \/>\n<meta property=\"og:description\" content=\"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail? Publi\u00e9 15 Septembre 2020&nbsp; La situation sanitaire que nous connaissons depuis plusieurs mois a bouscul\u00e9 la grande majorit\u00e9 des entreprises vers la mise en place soudaine du t\u00e9l\u00e9travail. Dans ce nouveau cadre, les entreprises continuent leur activit\u00e9 en demandant \u00e0 leurs collaborateurs de se connecter \u00e0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\" \/>\n<meta property=\"og:site_name\" content=\"Pragma Security\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-15T14:06:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-13T17:22:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2020\/09\/Pragma-Security-DDoS-Reverse-proxy.png\" \/>\n<meta name=\"author\" content=\"Solene Souquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Solene Souquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\"},\"author\":{\"name\":\"Solene Souquet\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd\"},\"headline\":\"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b\",\"datePublished\":\"2020-09-15T14:06:55+00:00\",\"dateModified\":\"2023-11-13T17:22:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\"},\"wordCount\":681,\"publisher\":{\"@id\":\"https:\/\/pragma-security.com\/#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\",\"url\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\",\"name\":\"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b - Pragma Security\",\"isPartOf\":{\"@id\":\"https:\/\/pragma-security.com\/#website\"},\"datePublished\":\"2020-09-15T14:06:55+00:00\",\"dateModified\":\"2023-11-13T17:22:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pragma-security.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pragma-security.com\/#website\",\"url\":\"https:\/\/pragma-security.com\/\",\"name\":\"Pragma Security\",\"description\":\"Protection anti-DDoS | DNS | WAF\",\"publisher\":{\"@id\":\"https:\/\/pragma-security.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pragma-security.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pragma-security.com\/#organization\",\"name\":\"Pragma Security\",\"url\":\"https:\/\/pragma-security.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg\",\"contentUrl\":\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg\",\"width\":436,\"height\":394,\"caption\":\"Pragma Security\"},\"image\":{\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd\",\"name\":\"Solene Souquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g\",\"caption\":\"Solene Souquet\"},\"url\":\"https:\/\/pragma-security.com\/index.php\/author\/soso\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b - Pragma Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b - Pragma Security","og_description":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail? Publi\u00e9 15 Septembre 2020&nbsp; La situation sanitaire que nous connaissons depuis plusieurs mois a bouscul\u00e9 la grande majorit\u00e9 des entreprises vers la mise en place soudaine du t\u00e9l\u00e9travail. Dans ce nouveau cadre, les entreprises continuent leur activit\u00e9 en demandant \u00e0 leurs collaborateurs de se connecter \u00e0 [&hellip;]","og_url":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/","og_site_name":"Pragma Security","article_published_time":"2020-09-15T14:06:55+00:00","article_modified_time":"2023-11-13T17:22:38+00:00","og_image":[{"url":"https:\/\/pragma-security.com\/wp-content\/uploads\/2020\/09\/Pragma-Security-DDoS-Reverse-proxy.png"}],"author":"Solene Souquet","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Solene Souquet","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/#article","isPartOf":{"@id":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/"},"author":{"name":"Solene Souquet","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd"},"headline":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b","datePublished":"2020-09-15T14:06:55+00:00","dateModified":"2023-11-13T17:22:38+00:00","mainEntityOfPage":{"@id":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/"},"wordCount":681,"publisher":{"@id":"https:\/\/pragma-security.com\/#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/","url":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/","name":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b - Pragma Security","isPartOf":{"@id":"https:\/\/pragma-security.com\/#website"},"datePublished":"2020-09-15T14:06:55+00:00","dateModified":"2023-11-13T17:22:38+00:00","breadcrumb":{"@id":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pragma-security.com\/index.php\/2020\/09\/15\/securiser-vpn-teletravail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pragma-security.com\/"},{"@type":"ListItem","position":2,"name":"Comment s\u00e9curiser vos acc\u00e8s VPN \u00e0 l\u2019\u00e8re du t\u00e9l\u00e9travail?\u200b"}]},{"@type":"WebSite","@id":"https:\/\/pragma-security.com\/#website","url":"https:\/\/pragma-security.com\/","name":"Pragma Security","description":"Protection anti-DDoS | DNS | WAF","publisher":{"@id":"https:\/\/pragma-security.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pragma-security.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pragma-security.com\/#organization","name":"Pragma Security","url":"https:\/\/pragma-security.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/","url":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg","contentUrl":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg","width":436,"height":394,"caption":"Pragma Security"},"image":{"@id":"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd","name":"Solene Souquet","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g","caption":"Solene Souquet"},"url":"https:\/\/pragma-security.com\/index.php\/author\/soso\/"}]}},"_links":{"self":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/1328"}],"collection":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/comments?post=1328"}],"version-history":[{"count":15,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/1328\/revisions"}],"predecessor-version":[{"id":1396,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/1328\/revisions\/1396"}],"wp:attachment":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/media?parent=1328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/categories?post=1328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/tags?post=1328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}