
Virtual Private Networks
The purpose of the virtual private networks, or VPN, is to provide an end-to-end
secured tunnel between a client and a server. VPN are used, among other things, to
identify and to authorize access as well as to encrypt any traffic flowing in the
network.
To date, IPsec is the protocol that is the most used in VPN. IPsec, the reference
standard, is based on various protocols and algorithms according to the desired
security level:
•
authentication by public-key electronic signature (RSA);
•
integrity control by hash function (MD5);
•
confidentiality by means of symmetric algorithms, such as DES, 3DES, AES,
IDEA, blowfish, and so forth.
The use of a VPN is the most reliable way to secure a wireless network. This
method is also the most used.
IEEE 802.1x and Improvements to PLC Network Security 85
Komentarze do niniejszej Instrukcji