Saturday, June 1, 2019

Essay --

VIRTUAL PRIVATE NETWORK A journal article Submitted to Dr. David Beach Electronics and Computer Technology Department Indiana earth University By Teja TatiniTable of contents1.Introduction ------------------------------------------------------------- 32.Virtual Private Network ------------------------------------------------ 43.Purpose of VPN --------------------------------------------------------- 54.VPN protocols ----------------------------------------------------------- 5i)PPTP ----------------------------------------------------------- 5ii)L2TP --------------------------------------------------------- -- 5iii)IPsec ----------------------------------------------------------- 65.Modes of operation ----------------------------------------------------- 6i)AH ( Authentication Header) ------------------------------ 6ii)ESP ( Encapsulated Security Payload) -------------------- 76.VPN security considerations ------------------------------------------ 87. induction --------------------------------------------------------------- 88.References --------------------------------------------------------------- 9 Table of FiguresFig 1 Traditional leased line network --------------------------------- 3Fig 2 Basic VPN connection ---------------------------------------... ...ofile, encryption keys and algorithms.2.Personal firewalls should be installed and configured properly on the client VPN machines to block the unauthorized access to the client.3.The user should remain aware of the physical security of the machine, in particular when authentication information is stored in the machine.ConclusionVirtual Private Network provides a means of accessing a secure, private, internal network over insecure networks like external networks and internet. The most widely utilise technology in VPN is IPsec in most of the business environment to provide secure and safe encrypted data transfer between host and different remotely accessible clients.References1.http//info.lib.uh.edu/services/vpn.html 2.http//www.positivenetworks.net/images/client-uploads/jumppage2.htm3.http//vpn.shmoo.com/ 4.http//www.ipvanish.com/why-vpn.php

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.