Results 1 to 6 of 6

Thread: How to secure a vpn network

  1. #1
    Join Date
    Nov 2009
    Posts
    45

    How to secure a vpn network

    Lets take for example that their is a small fir which is using a vpn network across the globe. The work is to share current publication and documents. So if this network is live and prone to threats and how to secure a vpn network . What are the different way available for the same networks security. Does this needs an additional hardware or software addition.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How to secure a vpn network

    A firewall presents a strong blockade between your confidential network and the Internet. You can situate the firewalls to control or limit the number of open ports, like the types of packets are passed during and which protocols are permitted through. Some VPN products, such as Cisco's 1700 routers, can be improved to contain the firewall capabilities by working the suitable Cisco IOS on them. You be supposed to be already having a better firewall in place before you put in practice a VPN, but a firewall can also be used to conclude the VPN sessions.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: How to secure a vpn network

    Encryption is the procedure of taking all the data that your computer is distributing to a different and programming it into a form that only the additional computer will be capable to translate. Most computer encryption systems feel right in one of two categories like Symmetric-key encryption and Public-key encryption. This is the ways of securing the network.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: How to secure a vpn network

    If you selected for symmetric-key encryption, every computer has a secret key (code) that it can use to encrypt a packet of information in sequence sooner than it is sent over the network to a different computer. Symmetric-key necessitate that you be familiar with which computers will be talking to every other so you can install the key on every one. Symmetric-key encryption is fundamentally the similar as a secret code that every of the two computers must know in order to translate the information in sequence.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: How to secure a vpn network

    Your browser does not sustain or maintain the JavaScript or it is put out of action. The computer which is distributing the encrypts the certificate with a symmetric key, and then encrypts the symmetric key with the public key of the receipt of the computer. In receipt of the computer uses its confidential key to translate the symmetric key. It then uses the symmetric key to translate the document.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: How to secure a vpn network

    Public-key encryption uses a mixture of a confidential key and a public key. The confidential key is recognized by only to your computer, at the same time as the public key is given by your computer to any computer that requires communicating strongly with it. To translate an encrypted message, a computer is required to use the public key, presented by the originating computer, and its own personal key. Very accepted public-key encryption usefulness is called Pretty Good Privacy (PGP), which permits you to encrypt approximately anything. You can find out additional about PGP at the PGP site.

Similar Threads

  1. Secure internal network from Hacking
    By HALLBJORN in forum Networking & Security
    Replies: 4
    Last Post: 14-12-2010, 02:28 PM
  2. What are the ways to secure Linux network
    By Angelica Maria in forum Networking & Security
    Replies: 6
    Last Post: 13-03-2010, 10:08 AM
  3. How to make MAC Network more secure
    By Balamohan in forum Networking & Security
    Replies: 5
    Last Post: 24-12-2009, 04:09 AM
  4. How to secure my wireless network?
    By ANISSA in forum Networking & Security
    Replies: 3
    Last Post: 28-07-2009, 03:40 PM
  5. Secure network with a local code
    By AngerEyes in forum Networking & Security
    Replies: 3
    Last Post: 13-03-2009, 06:58 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,728,863,504.92475 seconds with 17 queries