Results 1 to 6 of 6

Thread: How to utilize ipsec on a vpn network

  1. #1
    Join Date
    Nov 2009
    Posts
    44

    How to utilize ipsec on a vpn network

    What are the different types of technology available to protect a virtual network from intrusions. The one I am familiar with is ipsec. What does it offers and how to use the ipsec on the vpn network to encrypt the data and does allow any leakage. Also post some information about aaa server authentication and vpn concentrators.

  2. #2
    Join Date
    May 2008
    Posts
    2,945

    Re: How to utilize ipsec on a vpn network

    Internet Protocol Security Protocol (IPSec) presents and improved sanctuary characteristic such as superior encryption algorithms and additional comprehensive authentication. IPSec has two encryption methods: the tunnel and transport. Tunnel encrypts the header and the consignment of every packet at the same time as transport only encrypts the consignment. Only systems that are IPSec accommodating can take benefit of this protocol. Also, all devices are required to use a general key and the firewalls of every network must have very comparable security policies set up.

  3. #3
    Join Date
    Feb 2008
    Posts
    2,635

    Re: How to utilize ipsec on a vpn network

    IPSec can encrypt data connecting several devices, it can be like: Router to router, Firewall to router, you computer to router and system to the server. AAA (authentication, authorization and accounting) servers are used for additional protected right of entry in a remote-access VPN environment. When a application to establish a conference it comes in from a dial-up client, the demand is proxied to the AAA server.

  4. #4
    Join Date
    Nov 2009
    Posts
    4,494

    Re: How to utilize ipsec on a vpn network

    AAA will be checking the following things to formulate your network safe or protected. First who you are (verification), what you are permitted to do (approval) and what you really do (secretarial). The accounting information in sequence is particularly helpful for tracking client use for sanctuary auditing, billing or reporting functions. So you stay on the safer side.

  5. #5
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How to utilize ipsec on a vpn network

    Incorporating the mainly superior encryption and confirmation techniques obtainable, Cisco VPN concentrators are built particularly for generating a remote-access VPN. They present high accessibility, high presentation and scalability and contain elements, called scalable encryption processing (SEP) modules that facilitate the users to easily enlarge the ability and throughput. The concentrators are obtainable in models appropriate for everything from small businesses with up to 100 remote-access users to huge organizations with up to 10,000 instantaneous remote users.

  6. #6
    Join Date
    May 2008
    Posts
    3,516

    Re: How to utilize ipsec on a vpn network

    Cisco's VPN-optimized routers present the scalability, routing, sanctuary and QoS (excellence of service). Which is based on the Cisco IOS (Internet Operating System) software, there is a router which is appropriate for each circumstances, from small-office/home-office (SOHO) right of entry through central-site VPN aggregation, to large-scale enterprise requirements.

Similar Threads

  1. How do you utilize your 5GHz band?
    By Chung Ae in forum Networking & Security
    Replies: 3
    Last Post: 03-10-2011, 03:33 AM
  2. How to utilize tar and untar over SSH in red hat linux
    By Nitesha in forum Operating Systems
    Replies: 5
    Last Post: 16-09-2011, 09:04 AM
  3. How can I utilize a 95 watt cpu in a 95 max tdp MB
    By Lucretia in forum Motherboard Processor & RAM
    Replies: 5
    Last Post: 27-11-2010, 12:14 AM
  4. How to utilize iHaxGamez
    By LoknathT in forum Windows Software
    Replies: 6
    Last Post: 23-10-2010, 03:54 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,859,997.82195 seconds with 17 queries