logo

REPORT ON VIRTUAL PRIVATE NETWORK

Review existing literatures on VPN technologies and issues and write a report.

12 Pages1820 Words59 Views
   

Added on  2022-09-17

REPORT ON VIRTUAL PRIVATE NETWORK

Review existing literatures on VPN technologies and issues and write a report.

   Added on 2022-09-17

ShareRelated Documents
Running head: REPORT ON VIRTUAL PRIVATE NETWORK
REPORT
ON
VIRTUAL PRIVATE NETWORK
Name of the Student
Name of the University
Author Note:
Table of Contents
REPORT ON VIRTUAL PRIVATE NETWORK_1
Virtual Private Network1
Introduction:...............................................................................................................................2
Literature Review:..................................................................................................................2
Authentication & Access Control:.............................................................................................3
Confidentiality and Integrity Process:........................................................................................7
Protection against Replay Processes:.........................................................................................8
Remote Access:..........................................................................................................................9
Conclusion:................................................................................................................................9
Reference:................................................................................................................................10
REPORT ON VIRTUAL PRIVATE NETWORK_2
Virtual Private Network2
Introduction:
The primary objective of this report is to analyze the processes and the
security features of the trending technologies. Followed by this analyze it will
provide the knowledge about how these technologies allows to have remote
access to the organizations network without worrying about the security concern
of the organization. In order to support the above investigation this paper will
effectively analyze the aspects of authentication and access control, integrity
and confidentiality, protection against replay process and the aspect of remote
access with related protocols and technology with the purpose provide a brief
overview on how they works and what are the possible opportunities are present
in this field.
Literature Review:
The analysis has been conducted with the purpose to elaborate the security
methods as well as the services of the technology which holds the capability to
transfer data across the internet. Followed by this aspect a detail elaboration on
this is mentioned below:
Virtual Private Network (VPN) – In the field of organizational network
virtual private network works by securing the link or interconnection
between the internet server and the device as well as it protects from the
internet spoofing, phishing attack. Followed by this it has been also
noticed that it also offers the ability to protect the internet traffics as
well. In order to complete the above mentioned process VPN enables the
organization to hide their IP address, unblock the censored websites as
well as in order to protect the data transmission process it follows the
communication encryption process which includes several protocols such
as the PPTP, OpenVPN, SSTP, IKEv2, L2TP/IPSec [1].
REPORT ON VIRTUAL PRIVATE NETWORK_3
Virtual Private Network3
In followed by this is a significance of two types of VPNs which
includes the SSL VPN and IPSec VPN.
One of the most significant difference in these two VPN’s is its SSL VPN
establishes network connection for the SSL VPN and the IPSec VPN
establishes a site to site connection between the BO and HO.
Followed by the asked question it has been observed from the analysis of
the Cisco ASA 5500 features that it offers effective web filtering, anti-
phishing, anti-spam in IPSec VPN’s. The primary objective of this
appliances is to protect the network servers from the malware attacks.
Along with that in the operations of IKE there is a significant application
of the Cisco ASA 5500 in which it allows the users to protect the servers
from the unauthorized access [2].
Followed by the above aspects it has been noticed that there is
significant impact of the VPN in the IT business structure as it offers the
capabilities to protect the organizational network from the external
threats such as the spoofing attack, hacking. Along with that it allows
secure data transmission across the internet network. Apart from this
reduction of the international censorships and the remote access feature
enhanced the services of the IT organization.
Followed by the aspect to connect the mobile devices it has been noticed
that there is significant application of Cisco AnyConnect as has been
designed in such way that the devices needs to be verified as well as
needs to be connected in order to be connected with each other. Hence
the primary structure is to connect authenticate as well as verified
devices by AnyConnect and allow them to access the internet server.
REPORT ON VIRTUAL PRIVATE NETWORK_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.
|14
|2762
|18

Report on Virtual Private Network 2022
|12
|2383
|26

Virtual Private Network (VPN) Report 2022
|14
|2220
|21

Virtual Private Network (VPN) | Literature Review
|6
|926
|72

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Types of VPN and Encryption Techniques
|13
|2690
|49