The Shrink - Wrapped VPN Node Technical

نویسندگان

  • Vassilis Prevelakis
  • Angelos Keromytis
چکیده

The wide availability of public domain IPsec implementations allows the creation of VPNs based on low-cost platforms. However, setting up a VPN node involves a lot of work such as the creation of IPsec Security Associations and associated tunnels, including the necessary management of keys. Moreover, routing and firewall facilities must be provided to ensure the isolation of the members of the VPN from the public Internet. In this paper we present a drop-in VPN node that is compact, low-cost and requires little administration or maintenance. We discuss the features and advantages of our system. Next, we demonstrate how this system was used for the creation of a VPN linking networks within the University campus with others located in outside locations (e.g. other companies, home networks etc). Finally, we present our evaluation of the work performed and describe our future plans.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Engineering for Designing the Coupling of a 32 MW Rotor-generator by Shrink Fitting Method (TECHNICAL NOTE)

This study presents a designing process for refurbishing of a 32 MW rotor-generator damaged coupling. The reason of rotor damage was being hit by the quivers of an explosion. The original coupling was union with the rotor formed after a machining process on a mono block forged rotor. In some areas imposed damages caused the breaking off and detachment of some parts in the coupling flange. Becau...

متن کامل

Shrink - Wrapped Boundary Face Algorithm for Mesh Reconstruction from Unorganized Points

Bon Ki Koo et al. 235 ABSTRACT⎯A new mesh reconstruction scheme for approximating a surface from a set of unorganized 3D points is proposed. The proposed method, called a shrink-wrapped boundary face (SWBF) algorithm, produces the final surface by iteratively shrinking the initial mesh generated from the definition of the boundary faces. SWBF surmounts the genus-0 spherical topology restriction...

متن کامل

Synchronize and Stabilize vs. Open-source

An analysis of 2 team-organization models when developing consumer-level shrink-wrapped software.

متن کامل

The Development of a Commercial “Shrink-Wrapped Application” to Safety Integrity Level 2:

Abstract. We report on some of the development issues of a commercial “shrink-wrapped application”—DUST-EXPERTTM—that is of particular interest to the safety and software engineering community. Amongst other things, the following are reported on and discussed: the use of formal methods; advisory systems as safety related systems; safety integrity levels and the general construction of DUST-EXPE...

متن کامل

Ring-Based P2P-VPN for Realizing Cybersociety

In this paper, we propose a ring-based P2P-VPN (Peer-to-Peer Virtual Private Network) that provides a secure and reliable network to a large number of virtual organizations. The ring-based P2P-VPN establishes VPN by logically connecting nodes that operate autonomously in a ring topology. The ring-based P2P-VPN has an advantage of a high scalability in terms of the number of VPNs accommodated. I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000