Casual virtual private network
نویسندگان
چکیده
Virtual Private Networks (VPNs) [1] allow individuals and business to create and maintain secure communication channels between their own local networks using public and insecure networks, like Internet, instead of private and leased lines. The main purpose of a VPN is to securely and transparently connect two or more remote networks to form virtually a single network. Network architectures defined by VPNs are inherently more scalable and flexible than pure private networks because they allow organizations to add and remove branch offices in an easier way. Other benefits of VPNs include obtaining almost the same capabilities of private or leased lines at much lower cost, and providing roaming users (or “Road-Warriors”) with secure connections to their corporate or personal networks whenever they need them. VPNs achieve the same level of protection as private networks using security mechanisms like encryption and authentication schemes. Those security mechanisms are centrally managed by a pre-defined security policy, which controls all communications inside the VPN by dictating when and how the protection is applied. In most cases, for security reasons, VPN users cannot change the security policy, and they cannot dynamically choose whether their communications are going to be protected or not. This high level of protection and connectivity achieved by VPNs, although desirable and necessary, is not useful for networks which do not want to provide transparent access to their resources within their networks, but only want to provide temporary secure access to internal services based on users’ demands. Although it is possible to provide protection for every service using modified clients and protocols, it could be useful to have an architecture that provides a userinitiated, transparent and secure connection between networks without securing every individual service. We call the
منابع مشابه
Casual Virtual Private Networks
Virtual Private Networks (VPNs) provide a cost-effective way for securing communications using public and insecure networks like the Internet. The main purpose of a VPN is to securely and transparently connect two or more remote networks to form virtually a single network, using centralized security policies for better management and protection. However, in certain scenarios, users may not requ...
متن کاملWireless Network Security
Wireless networking is inherently insecure. From jamming to eavesdropping, from man-inthe middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. However, much of the commonly used secu...
متن کاملProvisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...
متن کاملInternet - Draft Virtual
This document describes a Layer3 Virtual Private Network (L3VPN)based subnet extension solution referred to as Virtual Subnet, which can be used for building Layer3 network virtualization overlays within and/or across data centers.
متن کاملPrivacy issues in virtual private networks
The term “private” in virtual private network is sometimes taken for granted, and people can be too distracted by the “virtual” and “network” to really consider what is meant by “private.” In this paper, we consider the issues and meanings of the term private, and look at these issues with respect to two of the dominant VPN technologies, IPsec and MPLS.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. Syst. Sci. Eng.
دوره 20 شماره
صفحات -
تاریخ انتشار 2005