Thursday, January 23, 2020
Essay --
                                                                                       VIRTUAL PRIVATE NETWORK                                                         A journal article                                                  Submitted to                                               Dr. David Beach                   Electronics and Computer Technology Department                                          Indiana State University                                                           By                                                  Teja Tatini      Ã¢â¬Æ'  Table of contents:  1.	Introduction -------------------------------------------------------------    3  2.	Virtual Private Network ------------------------------------------------   4  3.	Purpose of VPN ---------------------------------------------------------   5  4.	VPN protocols -----------------------------------------------------------   5  i)	PPTP -----------------------------------------------------------   5  ii)	L2TP -----------------------------------------------------------   5  iii)	IPsec -----------------------------------------------------------   6  5.	Modes of operation -----------------------------------------------------  6  i)	AH ( Authentication Header) ------------------------------   6  ii)	ESP ( Encapsulated Security Payload) --------------------  7  6.	VPN security considerations ------------------------------------------  8  7.	Conclusion ---------------------------------------------------------------  8  8.	References ---------------------------------------------------------------  9                                      Table of Figures:  Fig 1:  Traditional leased line network ---------------------------------    3  Fig 2: Basic VPN connection ---------------------------------------...              ...ofile, encryption keys and algorithms.  2.	Personal firewalls should be installed and configured properly on the client VPN machines to block the unauthorized access to the client.  3.	The user should remain aware of the physical security of the machine, in particular when authentication information is stored in the machine.    Conclusion:  Virtual Private Network provides a means of accessing a secure, private, internal network over insecure networks like external networks and internet. The most widely used technology in VPN is IPsec in most of the business environment to provide secure and safe encrypted data transfer between host and different remotely accessible clients.            References:  1.	http://info.lib.uh.edu/services/vpn.html   2.	http://www.positivenetworks.net/images/client-uploads/jumppage2.htm  3.	http://vpn.shmoo.com/   4.	http://www.ipvanish.com/why-vpn.php                              
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.