Tuesday, February 12, 2019

Essay --

VIRTUAL PRIVATE NETWORK A journal article Submitted to Dr. David Beach Electronics and Computer Technology Department Indiana evince University By Teja Tatini slacken of contents1.Introduction ------------------------------------------------------------- 32.Virtual tete-a-tete earnings ------------------------------------------------ 43.Purpose of VPN --------------------------------------------------------- 54.VPN protocols ----------------------------------------------------------- 5i)PPTP ----------------------------------------------------------- 5ii)L2TP ---------------------------------------------- ------------- 5iii)IPsec ----------------------------------------------------------- 65.Modes of operation ----------------------------------------------------- 6i)AH ( Authentication Header) ------------------------------ 6ii)ESP ( Encapsulated trade protection Payload) -------------------- 76.VPN security considerations ------------------------------------------ 87.Conclusion --------------------------------------------------------------- 88.References --------------------------------------------------------------- 9 Table of FiguresFig 1 Traditional leased line network --------------------------------- 3Fig 2 Basic VPN connection ---------------------------------------... ...ofile, encryption keys and algorithms.2.Personal firewalls should be installed and configured properly on the client VPN machines to block the unauthorized opening to the client.3.The user should remain aware of the physical security of the machine, in inciden t when authentication information is stored in the machine.ConclusionVirtual Private Network provides a means of accessing a secure, private, internal network over precarious networks like external networks and internet. The most widely used technology in VPN is IPsec in most of the business environment to provide secure and risk-free encrypted data transfer between host and different remotely loving clients.References1.http//info.lib.uh.edu/services/vpn.html 2.http//www.positivenetworks.net/images/client-uploads/jumppage2.htm3.http//vpn.shmoo.com/ 4.http//www.ipvanish.com/why-vpn.php

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.