Featured Post
Policy Implications of Psychology Model of Mental Disorder
Strategy Implications of Psychology Model of Mental Disorder This paper will audit the article Policy ramifications of a mental model of ...
Wednesday, October 2, 2019
Essay --
VIRTUAL PRIVATE NETWORK A journal article Submitted to Dr. David Beach Electronics and Computer Technology Department Indiana State University By Teja Tatini ââ¬Æ' Table of contents: 1. Introduction ------------------------------------------------------------- 3 2. Virtual Private Network ------------------------------------------------ 4 3. Purpose of VPN --------------------------------------------------------- 5 4. VPN protocols ----------------------------------------------------------- 5 i) PPTP ----------------------------------------------------------- 5 ii) L2TP ----------------------------------------------------------- 5 iii) IPsec ----------------------------------------------------------- 6 5. Modes of operation ----------------------------------------------------- 6 i) AH ( Authentication Header) ------------------------------ 6 ii) ESP ( Encapsulated Security Payload) -------------------- 7 6. VPN security considerations ------------------------------------------ 8 7. Conclusion --------------------------------------------------------------- 8 8. References --------------------------------------------------------------- 9 Table of Figures: Fig 1: Traditional leased line network --------------------------------- 3 Fig 2: Basic VPN connection ---------------------------------------... ...ofile, encryption keys and algorithms. 2. Personal firewalls should be installed and configured properly on the client VPN machines to block the unauthorized access to the client. 3. The user should remain aware of the physical security of the machine, in particular when authentication information is stored in the machine. Conclusion: Virtual Private Network provides a means of accessing a secure, private, internal network over insecure networks like external networks and internet. The most widely used technology in VPN is IPsec in most of the business environment to provide secure and safe encrypted data transfer between host and different remotely accessible clients. References: 1. http://info.lib.uh.edu/services/vpn.html 2. http://www.positivenetworks.net/images/client-uploads/jumppage2.htm 3. http://vpn.shmoo.com/ 4. http://www.ipvanish.com/why-vpn.php
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.