Security in Virtual private network
نویسندگان
چکیده
Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible by using an expensive leased line solution or by dialling directly into the local area network (LAN). VPNs allow remote users to access private networks securely over the internet. A remote user in one part of the UK can establish a secure network connection using a VPN to a school LAN in another part of the UK and only incur the call cost for the local internet connection. A virtual private network gives secure access to LAN resources over a shared network infrastructure such as the internet. It can be conceptualised as creating a tunnel from one location to another, with encrypted data travelling through the tunnel before being decrypted at its destination. Remote users can connect to their organisation's LAN or any other LAN. They can access resources such as email and documents as if they were connected to the LAN as normal. By using VPN technology it is possible to connect to a school LAN from anywhere in the world via the internet, and to access it securely and privately without incurring the large communication costs associated with other solutions. Methods and Technology Used: i) To minimize usage of CPU and memory. ii) Comparison between two different platform of VPN based on hardware. Five phases for development of test bed process: i) Planning ii) Design iii) Implementation iv) Testing v) Compare vi) Compile Two VPN technologies that are being used are: i) Site-to-site VPN ii) Remote Access VPN
منابع مشابه
Provisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...
متن کاملA Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network
Most of the Virtual Private Network (VPN) suffers from security related and overhead problems. During the inter domain routing, the conventional protocols require each gateway to resend its routing table periodically to all its neighbors thus increasing the delay. Since VPNs carry sensitive information over an insecure network, the traffic in this network has to be transmitted reliably and secu...
متن کاملScalability Implications of Virtual Private Networks
This article gives an overview of the most promising technologies for service providers to offer virtual private network services. The focus of this article is on the analysis of the scalability implications of these virtual private network mechanisms on existing service provider backbone networks. Very often, when deploying VPN services, service providers will be confronted with a trade-off be...
متن کاملR. Ravi: Enhanced Provisioning Algorithm for Virtual Private Network in Hose Model with Quality of Service Support Using Waxman Model
As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...
متن کاملSecuring virtual private LAN service by efficient key management
Virtual private local area network service (VPLS) is a layer 2 service provider-provisioned virtual private network service. Security is one of the key system requirements of a VPLS because it delivers the frames via an untrusted network. Several VPLS architectures are proposed during the recent years. However, many of them do not provide a sufficient level of security. On the other hand, the e...
متن کاملIt Network Security for Control and Communication Systems in the Power Industry
Designing, implementing, running, and managing control and communication systems to state-of-the-art security standards is a major challenge to both power system integrators and operators, even more so in multi-vendor environments. In this paper, we discuss how industrially ruggedized network security appliances can provide building blocks and contribute to security solutions in both retrofit a...
متن کامل