session_09_vpn__ipsec__and_tls_101908

5 vpn ipsec and tls implementation of vpns located at

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Internet, VPNs will allow you to set up secure, controlled communications with all these parties. 5 VPN, IPSec and TLS Implementation of VPNs • Located at the carrier’s network — In the first scenario, the service provider provides a service similar to the public switched Frame Relay or ATM service, and the customer trusts that packets will not be misdirected, modified in transit, or subjected to traffic analysis by unauthorized parties. • On the customer’s premises — In the second scenario, the customer does not trust the service provider and implements a VPN using CPE equipment that provides firewall functionality and security. • Any devices with microprocessors, such as routers, servers, firewalls or even PCs, can perform VPN functions, such as creating tunnels and encrypting packets. VPN IPsec IKE v2 TLS M. Mogollon – 01/08 - 6 • When corporations use the public Internet as a backbone for their communications, there are two alternatives for VPN use: either the service provider provides a secure, managed VPN service or the customer buys the equipment and installs it on his premises. In the first scenario, the service provider provides a service similar to the public switched frame relay or ATM service, and the customer trusts that packets will not be misdirected, modified in transit, or subjected to traffic analysis by unauthorized parties. In the second scenario, the customer does not trust the service provider and implements a VPN using CPE equipment that provides firewall functionality and security. In this case, the service provider is used solely for IP packet transport. In both scenarios, security is created by connecting the two VPN endpoints by a virtual tunnel. 6 VPN, IPSec and TLS Secure VPN Business Partners Mobile Workforce Headquarters Internet Suppliers Customers Contractors Telecommuters VPNs With Secure VPNs, • I am sure to whom I am talking. • I know my message has not been modified. • I know that only authorized persons hav...
View Full Document

This note was uploaded on 05/26/2010 for the course TECH 6350 taught by Professor Mogollon during the Spring '10 term at University of Arkansas for Medical Sciences.

Ask a homework question - tutors are online