Week 11 2016 Spring Qourter Final Exam - CIS591 Spring...

This preview shows page 1 - 3 out of 7 pages.

CIS591 Spring Quartor 2016 Final ExamPlease answer all the questionsName: SANDEEP YADAV SUNDERBHAIDate:06/19/20161.What is Vertuaal Privet Network (VPN) How it works?Ans: A virtual private network (VPN) is a technology that creates an encrypted connection over aless secure network. The benefit of using a VPN is that it ensures the appropriate level ofsecurity to the connected systems when the underlying network infrastructure alone cannotprovide it. The justification for using a VPN instead of a private network usually boils down tocost and feasibility: It is either not feasible to have a private network (e.g., for a traveling salesrep) or it is too costly to do so. The most common types of VPNs are remote-access VPNs andsite-to-site VPNs.A remote-access VPN uses a public telecommunication infrastructure like the Internet to provideremote users secure access to their organization's network. A VPN client on the remote user'scomputer or mobile device connects to a VPN gateway on the organization's network, whichtypically requires the device to authenticate its identity, then creates a network link back to thedevice that allows it to reach internal network resources (e.g., file servers, printers, intranets) asthough it was on that network locally. A remote-access VPN usually relies oneitherIPsecorSSLto secure the connection, although SSL VPNs are often focused on supplyingsecure access to a single application rather than to the whole internal network. Some VPNsprovideLayer 2access to the target network; these require atunnelingprotocollikePPTPorL2TPrunning across the base IPsec connection.A site-to-site VPN uses a gateway device to connect the entire network in one location to thenetwork in another, usually a small branch connecting to a data center. End-node devices in theremote location do not need VPN clients because the gateway handles the connection. Most site-to-site VPNs connecting over the Internet use IPsec. It is also common to usecarrierMPLSclouds rather than the public Internet as the transport for site VPNs. Here, too, it ispossible to have eitherLayer 3connectivity (MPLS IP VPN) or Layer 2 (Virtual Private LANService, or VPLS) running across the base transport.
VPNs can also be defined between specific computers, typically servers in separate data centers,when security requirements for their exchanges exceed what the enterprise network can deliver.Increasingly, enterprises also use VPNs in either remote-access mode or site-to-site mode toconnect (or connect to) resources in a public infrastructure as a service environment. Newerhybrid-access scenarios put the VPN gateway itself in the cloud, with a secure link from thecloud service provider into the internal network.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
gao
Tags
Networking, Virtual private network, web sites, VPNs, Spyware

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture