[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Singh et al., 2013 - Google Patents

A Novel approach for the Analysis & Issues of IPsec VPN

Singh et al., 2013

View PDF
Document ID
7269582222109351499
Author
Singh P
Singh P
Publication year
Publication venue
International Journal of Sciences and Research

External Links

Snippet

Virtual Private Network is the technology to setup a private network in the public network. It is broadly accepted technology for corporate world for strengthen their business. A VPN connection can be represent as a pipe carrying enclosed private data via a public network …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Similar Documents

Publication Publication Date Title
US7596806B2 (en) VPN and firewall integrated system
EP3018861B1 (en) Configuration information sending method, system and apparatus
Jahan et al. Application specific tunneling protocol selection for Virtual Private Networks
US20060031936A1 (en) Encryption security in a network system
US20100138909A1 (en) Vpn and firewall integrated system
TW200824356A (en) A method for managing a newwork based VPN configuration, a method for establishing a VPN tunnel, and a system for configuring a VPN policy and establishing a VPN tunnel
Liyanage et al. Secure hierarchical VPLS architecture for provider provisioned networks
Singh et al. A Novel approach for the Analysis & Issues of IPsec VPN
Diab et al. VPN analysis and new perspective for securing voice over VPN networks
Fancy et al. An evaluation of alternative protocols-based Virtual Private LAN Service (VPLS)
Adeyinka Analysis of IPsec VPNs performance in a multimedia environment
Bou Diab et al. Critical vpn security analysis and new approach for securing voip communications over vpn networks
Xenakis et al. Secure VPN deployment in GPRS mobile network
Cisco Introduction to Cisco IPsec Technology
Cisco Introduction to Cisco IPsec Technology
Malik et al. Performance analysis of ip security vpn
Tymoshchuk et al. USING VPN TECHNOLOGY TO CREATE SECURE CORPORATE NETWORKS
Burande et al. Wireless network security by SSH tunneling
Hayale et al. Implementing Virtual Private Network using Ipsec Framework
Degefa VPN Scenarios, Configuration and Analysis:-
Parmar et al. Imperatives and Issues of IPSEC Based VPN
Wright Virtual private network security
Panchakarla Design and Implementaion of Firewall to Inspect Traffic in Encrypted VPN Tunnels
Al-Abaychi et al. Evaluation of VPNs
Mwape Performance evaluation of internet protocol security (IPSec) over multiprotocol label switching (MPLS).