Essays about: "IPSec VPN"

Showing result 1 - 5 of 18 essays containing the words IPSec VPN.

  1. 1. SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abel Tariku Sintaro; Yemi Emmanuel Komolafe; [2021]
    Keywords : Zero-Trust security model; Perimeter-based security model; Software- defined perimeter; IPSec VPN; performance evaluation; comparative study;

    Abstract : Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. READ MORE

  2. 2. Evaluation of Network-Layer Security Technologies for Cloud Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bruno Marcel Duarte Coscia; [2020]
    Keywords : Overlay network; Network security; IPsec; Slack nebula; Nebula; Noise framework; Noise protocol; Överlagring Nätverk; Nätverkssäkerhet; IPsec; Slack nebula; Nebula; Noise ramverk; Noise protokoll;

    Abstract : With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. READ MORE

  3. 3. VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Sanel Habibovic; [2019]
    Keywords : Virtual Private Network; VPN; WireGuard; IPSec; OpenVPN; Performance; Unreliability; Packet Loss; Delay;

    Abstract : This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. READ MORE

  4. 4. How to design a trustworthy IPsec VPN device employing nested tunnels?

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Alexander Spottka; [2018]
    Keywords : Nesting; IPSec; nested; tunnel; encryption;

    Abstract : Enterprises use site-to-site \textit{Virtual Private Network} (VPN) technology to securely transmit data over insecure networks, such as the Internet. By utilizing commercial VPN products, organizations partially rely on the vendors to keep their communication out of reach from malicious groups or individuals. READ MORE

  5. 5. Evaluation of VPNs

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mustafa Al-Abaychi; Joanna Ellvin; [2016]
    Keywords : ;

    Abstract : This thesis evaluated the performance of four different virtual private networks (VPNs): IP security (IPsec), OpenVPN, SSH port forwarding and SSH using virtual interfaces. To evaluate these VPNs, three comparative performance tests were carried out in which the maximum throughput of each VPN was measured. READ MORE