Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 3 of 6 pages
Running head:LITERATURE REVIEW Literature Review Name of the Student Name of the University Author’s Note
1LITERATURE REVIEW Significance of VPN Accordingto[1],thevirtualprivatenetwork(VPN)ismainlyusedforonline communication. This uses the infrastructure of the public network to physically allow the connection in. This establishes the private messaging network instead of using thecables. The value of the organization’s VPNis established between the employees and the stakeholders. This is the connection between the clients, staffs and specific comments are made by using the VPN technology. Implementation of VPN Once the users click on the providedlinks that isaccessible on the website, the request is passed to the clientserver and the corresponding server will get back the correct data. Both requests are routed through the private server while using the VPN in process. Following VPN Implementation protocols are available: OpenVPN PPTP SSTP L2TP / IPSec IKEv2 Comparison between SSL/VPN and IPSEC/VPN The key difference between the SSL/VPN and IPSECF/VPN is the network layer at which the authentication and the encryption are performed. The IPSEC/VPN operates the
2LITERATURE REVIEW network layer and this is used for encrypting the data that is being sent between the two systems, which the IP addresses identify. Appliances of Cisco Adaptive Security Theinternet key exchange protocol is used by the IPSec forsettingup thenetwork security secure server. According to [2], IPSec tunneling protocols are used by theAdaptive Security Appliancesfor creating thestable link between theremote users. The Adaptive Security Appliances function as tunnel endpoints. This will accept the different packets from the VPN, and analyzes transfer the packets to the appropriate protection point. The role of VPN Thehackerexploitsprotectedinternetconnections.Therefore,theusersneedto concentrate on the different approaches, which are used in the antivirus procedures. According to [3], the VPN creates the end-to-end encryption of all the data sent to the sender. It would cover the confidential clients and their organization’s details and other documents using the VPN. Advantages of SSL/VPN over IPSEC/VPN FeaturesSSL/VPNIPSEC/VPN ConnectivityIt connects only the process- specific User. The remote host is connected bythiscompletelytothe whole network Security ControlFurthersafeguardsonthe cycle with further operations. Wide access to the connection concerns confidentiality. ApplicationsIt is not able tosupport all IPIt willsupportallPrograms
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss