ZyXEL Communications PLA-470 V2 - V3.0.5 Guía de instalación Pagina 104

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 349
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 103
Virtual Private Networks
The purpose of the virtual private networks, or VPN, is to provide an end-to-end
secured tunnel between a client and a server. VPN are used, among other things, to
identify and to authorize access as well as to encrypt any traffic flowing in the
network.
To date, IPsec is the protocol that is the most used in VPN. IPsec, the reference
standard, is based on various protocols and algorithms according to the desired
security level:
authentication by public-key electronic signature (RSA);
integrity control by hash function (MD5);
confidentiality by means of symmetric algorithms, such as DES, 3DES, AES,
IDEA, blowfish, and so forth.
The use of a VPN is the most reliable way to secure a wireless network. This
method is also the most used.
IEEE 802.1x and Improvements to PLC Network Security 85
Vista de pagina 103
1 2 ... 99 100 101 102 103 104 105 106 107 108 109 ... 348 349

Comentarios a estos manuales

Sin comentarios