Академический Документы
Профессиональный Документы
Культура Документы
Here, scenario is two companies have internet facilities and wants to create a
communication between them. These companies just does not want to establish network between
them but also wants to full all the major security issue to get rid from threats. They want such
resource that would be for everyone to achieve which would conduct fewer prototypes of data.
Through these network they have security issue of VPN which also known as “Virtual Private
Network”.
These companies want to establish the VPN technology in their network. Functioning
procedure is excellence and also security of this technology is good. It has got different security
procedure which makes network protocol more secure so these companies require this
technology.
How its work, what are its properties, what are security issue it can handle, its drawbacks
and how can we overcome it. These are the issue to be discussed and to judge how much
applicable is this technology for this companies.
1. VPN:
This technology is known as VPN. It is also a private data communication that makes
advantage of people telecommunication architecture and balance privacy from the use of a tunnel
protocols and secure procedure.
1
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
1. Shared public network: In this connection VPN protocol is made in public network or
internet.
2. Logical equivalent: in this connection VPN protocol is establish between tow servers.
• For long distance dial-up with internet service VPN can be applicable.
• VPN has got different types of properties to create a safe network protocol.
• VPN has got different techniques and methods to increase the speed of network in
internet services.
So these are some of function of VPN or advantages that is very useful to these
companies.
1. VPN server:
System which accepts a VPN service from client then these clients can be said as VPN
server. This is done so data coming in server will not be threatened.
2
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
2. Tunnel:
Tunnel is some part of connection in which data are encapsulated. This procedure
increases confidential of data through transmission.
3. VPN client:
VPN client are those which can have access to VPN network like server. So VPN server
can be said as VPN client and it can be a individual node in network or router.
4. VPN connection:
In network protocol where there is data encapsulation and encryption in any stage of
network then that is called VPN connections.
Above we have discussed about components, connection and functions of VPN network
and there are properties of VPN network which can be classified into four groups:
1. Encapsulation:
2. Authentication:
In VPN technology authentication task can be classified into 3 different stages and they are
listed below:
This procedure is to create a VPN connection, in which VPN server authenticates, clients
only which is connected through Point –to- Point network is user-level using acceptance methods
which also makes sure VPN clients has appropriate authorization.
In this process if mutual authentication is used, VPN clients also access VPN server in
which it protect computer and makes like VPN server.
3
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
Conducting Internet Protocol secure (IPs), VPN server, clients used IKE for interchange
electronic data or pre-distributed key or in cases VPN clients or server authenticates each other
in computer stage. Here computer certification authentication is important because it is strong
authentication process. Here, this computer stage authentication is only performing for L2TP/
IPSec connection.
This procedure identifies data transferred on VPN a connection which is originated at last
end of connection and not changed in transmits. Here data consist checksum base encryption key
which is represent by sender and receiver.
3. Data encryption:
For highly confidentiality of data while transmitting through network when data send by
sender it is encrypted and receiver decrypted it to see it.
So this encrypts and decrypt is done by sender and receiver base on encryption key. The
intercepted packets when is send through VPN they are not readable to anyone who doesn’t have
any common encryption key. For this it needs lot computing power and computing period as
encrypt key get larger.
4. Address allocation:
The process of assigning remote clients address dynamically or statically. Each clients are
given a address in network that address become part of VPN client network. Addressing
elements like Subnetting, Supernetting or Network Address Translation (NAT) which is applied
to obtained address of clients in VPN network. Here NAT only is not used only for assigning
address but also can be use for secure data transmission in network.
4
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
In this address location IP address are assigned dynamically. For this assigning DHCP
server is required. DHCP server will automatically assign address in dynamic form.
In this location IP address is assigned form the mass of address. Here IP for network is
statically assign as assigned in internet.
2.
VPN technology can be use for secure premises of data transferring in network. It has lots
of security technique which is much applicable. So this VPN technology can be set up in both
internet based connection and intranet based connection.
5
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
• Site-to-site VPN:
6
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
When data is transferred in network a data chunks are send to next router through the VPN
link in this procedure VPN works as a data-link layer. The detail is shown in diagram.
The major factor of connecting VPN technology over an intranet is when human resource
department is physically unavailable from whole organization’s intranet in such case which
secure department’s data for those users who are physically linked to different part.
Here its server job is not to provide direct connection between the router and separate
network segments. Here client VPN can connect which server and can achieve access to protect
resource of delicate department. And data across VPN is encrypted for data confidentiality for
strong secure premises. To those who have no permission to access VPN network it is separate
network segment which is hidden from external viewers.
7
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
• User authentication:
Here authentication has two factors computer authentication and user authentication.
• Tunnel authentication:
• Encryption procedure:
This IPSec is designed for purpose of protecting data. The data are encrypted and
send to network so data won’t be lost or mishandle.
8
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
It is most necessary protect data to get misplaced or corrupted. Here IPSec has
different kind of key for such encryption methods. So main function of VPN technology is to
create an encryption in data between VPN client and server. But this procedure is not
required between network path between dial-ups client and ISP.
• Packet filtering:
• Authorization:
In VPN technology only those clients and router are implemented without
authorization. Authorizations are given according to the database and data contain in
network. Different types of components i.e. IPSec gives authorization in VPN network to
routers and clients. This procedure can secure data from illegal viewing.
9
Name: Navin Singh Thapa
Id number: 1801T3090101
Subject code: CNW101 VPN network
If account is valid or is genuine then that connection is authorized and server accepts
remote access polices and user account properties for the VPN client. After this
authorization it will give full access to connect with client VPN.
So this is the overview properties of VPN technology. This research shows all
properties of VPN technology. The above research says that it is best to collaborate with
VPN during intranet protocol development. Security is major advantage of this technology.
So for data protection, client backup recovery and acceleration of network this
technology is best. And recommendation for this technology is best for these companies to
add VPN technology to their intranet system.
References: http://www.scribd.com/doc/40327894/Reasearch-on-VPN-Connection
http://technet.microsoft.com/en-us/library/cc772120(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc958052.aspx
http://technet.microsoft.com/en-us/library/cc958052.aspx
10
Name: Navin Singh Thapa
Id number: 1801T3090101