A Interview On Virtual Private Network

1242 Words5 Pages
Assignment 1 Unit: BN305 Virtual Private Networks Student name: Gjorgji Babarovski Student ID: MIT 140626 Teacher name: Paul Carnie “VPN, or virtual private network, is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company 's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. “- Vangie Beal, 2015 [8] Part I 1) On figure 1 obviously we can see Site-to-Site network diagram with 3 Ethernets and they are all…show more content…
[1] 2) Internet Protocol Security (IPSec) is a protocol suite to make Internet protocol more secure by authenticating and encrypting every IP packet of one communication session. Beside from the changes that we have done for the first task, we need to implement IPSec in the tunnel, so figure 1 would be able to run GRE over IPSec. IPSec involves many component technologies and encryption methods, also IPSEC uses to main protocols to create security frame work: Authentication header and Encapsulating security payload. Authentication header does not provide encryption, that’s mean only authenticates the sender of the data. If we use authentication header alone, it can provide week protection and also it can show some problems if the environment uses NAT. While encapsulating security payload provides the same security services as authentication header, except the only difference is ESP can encrypt the payload. IPSec technology is competently invisible in its operation because it is based in network level. Another thing is the end users are not even directly interacting and are not required to learn about IPSec encryption. [2] The advantage to monitor all traffic that going through the network is because IPSec is based in network level. Also IPsec is not application dependent, so we do not need to worry about application compatibility issues. Also there is some disadvantages, the role to encrypt and
Open Document