Protocols serve up VPN security

Marcotte, Greg
May 1999
Network World;05/31/99, Vol. 16 Issue 22, p41
Trade Publication
Features the virtual private network (VPN) protocols that network managers can consider to securely open corporate local area networks to telecommuters and disparate corporate sites. Point-to-Point Tunneling Protocol; Internet protocol (IP) Security; PPP protocol that defines point-to-point connections across an IP network; Microsoft Point-to-Point Encryption.


Related Articles

  • Realizing Distributed RSA Key Generation using VIFF. Mauland, Atle; Reistad, Tord Ingolf; MjĂžlsnes, Stig Frode // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2009, p122 

    In this experimental work, we have implemented and analyzed the performance of a protocol for multiparty RSA key generation. All players that take part in the key generation protocol get a share of the resulting private key, while no player gets any information about the prime numbers used. We...

  • Key to Wi-Fi security. Fleishman, Glenn // InfoWorld;1/13/2003, Vol. 25 Issue 2, p29 

    Provides information on the Wi-Fi Protected Access security standard of the Wi-Fi Alliance in the U.S. Protocol used by the standard as a replacement for the Wired Equivalent Privacy; Features; Security methods on which vendors are focusing.

  • Encrypt Telnet via IPsec in 10 Steps. Fellinge, Jeff // Windows IT Pro;Nov2005, Vol. 11 Issue 11, p8 

    The article details the steps for encrypting Telnet over an IPsec network. To create Telnet traffic over IPsec, the list of objects to consider are IPsec policy, IPsec security rule, IP filter list and filter action. The use of IPsec in conjuction with Telnet improves the computer security of...

  • SSL or IPSec? Or both? May, Susan // Communications News;Oct2003, Vol. 40 Issue 10, p16 

    Examines which of the two primary technology, Internet protocol security (IPSec) and secure sockets layer (SSL), should be used for mobile work force. Key benefits of IPSec; Development of SSL; Factors to consider before choosing the appropriate solution.

  • Protocols Guide: Network Security Technologies and Protocols: Secured Routing Protocols: IPsec AH: IPsec Authentication Header.  // Network Protocols Handbook;2007, p97 

    Information on IP Authentication Header (AH) from a chapter of the book "Network Protocols Handbook," Fourth Edition, is presented. It refers to a key protocol in the Internet Protocol Security (IPsec) architecture that is used to provide connectionless integrity and data origin authentication...

  • Don't be an accidental vandal. Barron, Nick // SC Magazine: For IT Security Professionals (UK Edition);Aug2006, p20 

    The author offers an opinion on the importance of monitoring what is going out of the network time protocol and at the same knowing what is coming in to ensure that the volume of requests hitting the service is valid. He presents a case in which an operator in Denmark had discovered that the...

  • STUDY AND IMPLEMENTATION OF LIBRARY WORKGROUP BASED ON SECURITY POLICY SYSTEM. HE PING // Journal of Theoretical & Applied Information Technology;01/28/2013, Vol. 48 Issue 3, p1685 

    IPSec provides cryptographic-based security protection mechanism for IP packets. The correct implementation of IPSec depends on the security protection parameters included in security policies. IETF Library workgroup's proposal of security policy system architecture can simplify the task of...

  • Authentication Header.  // Network Dictionary;2007, p50 

    An encyclopedia entry for authentication header (AH) is presented. It is a protocol in the Internet Protocol security (IPsec) suite which is used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays. It provides...

  • IPsec Authentication Header.  // Network Dictionary;2007, p261 

    A definition of the term "IPsec Authentication Header (IPsec AH)" in computer security is presented. IPsec AH is defined as a key protocol in the IPsec (Internet Security) architecture used to provide connectionless integrity and data origin authentication for IP datagrams, and to provide...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics