project - VIRTUAL PRIVATE NETWORKS(VPNs SE 572 NETWORK...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
VIRTUAL PRIVATE NETWORKS (VPNs) SE 572 – NETWORK SECURITY Table of Contents 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction ……………………………………………………………. 3 Summary of Network Security Technology/Problem Solution ……. 4 Problem: ……. ..……………….………………………………. . 4 Solution: ………. ..……………………. .………………………. . 4 VPN Network Diagram ………………………………………………. 5 LAN/WAN Integration Issues ………………………………………. . 6 Feasibility Study ………………………………………………………. 6 Operational Plan ……………………………………………………… 7 Protection ………………………………………………………. 7 Profits …………………………………………………………. .. 7 Productivity ……………………………………………………. . 7 Conclusion ……………………………………………………………. . 8 References ……………………………………………………………. . 9 Introduction A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an 2
Background image of page 2
expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. Companies spend tons of money to build firewalls and other network security measures aimed specifically at ensuring that nobody from the public Internet can get into the internal network. How do you reconcile wanting to block the public Internet from accessing the internal network with wanting your remote users to utilize the public Internet as a means of connecting to the internal network? You implement a Virtual Private Network (VPN). A VPN creates a virtual “tunnel” connecting the two endpoints. The traffic within the VPN tunnel is encrypted so that other users of the public Internet can not readily view intercepted communications. By implementing a VPN, a company can provide access to the internal private network to clients around the world at any location with access to the public Internet. It erases the administrative and financial headaches associated with a traditional leased line wide-area network (WAN) and allows remote and mobile users to be more productive. Best of all, if properly implemented, it does so without impacting the security and integrity of the computer systems and data on the private company network. Summary of Network Security Technology/Problem Solution
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/19/2009 for the course MISM TM583 taught by Professor Jones during the Spring '09 term at Keller Graduate School of Management.

Page1 / 9

project - VIRTUAL PRIVATE NETWORKS(VPNs SE 572 NETWORK...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online