4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Morning, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is GGSN?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

How does VPN work ?
ngnguru_com 27-January-2009 07:07:05 PM

Comments


broadbandcorporation.com/hnet/vpn.html
Posted by crouse


www.alliancedatacom.com/how-vpn-works.asp
Posted by crouse


Follow the link for more info www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by HamidAliKhan


http://www.alliancedatacom.com/how-vpn-works.asp

http://www.rice.edu/it/network/vpn-how.html

Posted by crouse


How Virtual Private Networks Work. by Jeff Tyson .... That's essentially how a VPN works. Each remote member of your network can ...
for more details
www.alliancedatacom.com/how-vpn-works.asp - 45k -
Posted by waqasahmad


www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by crouse


www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by crouse


For more info

http://www.cit.cornell.edu/services/vpn/FAQVPN.html
Posted by Hash007


The easiest way an individual can gain access to a Rice computer is by stealing a password that is transmitted through the Internet in readable form, or cleartext, from a remote user to a Rice computer. Attackers steal passwords using sophisticated programs, called sniffers, that analyze all of the data passing by a compromised computer and produce lists of computer names, userids, and cleartext passwords. Passwords can also be stolen by programs called Trojan horses that mimic a computer's normal login sequence. (Note that password theft is a violation of Texas law.) Armed with the valid userid and password, the attacker can simply log in and then attempt to gain control of the computer. An attacker who installs a sniffer at a busy network exchange point or a Trojan horse in a popular web service may be able to gain access to thousands of computers.

Rice's VPN is built around Cisco Systems 3000 Concentrator. A small client program (VPN 3000 Client) runs in the remote user's Windows, MacOS, Solaris, or Linux computer. The 3000 and client implement the Internet IPSEC protocol (Internet Protocol SECurity) to establish an encrypted pathway or tunnel to Rice.
The gateway authenticates the remote user's identity through the use of passwords. The remote user's identity determines that user's membership in a VPN group that, in turn, determines what Internet sites will be accessed through the tunnel. Because the Rice end of the tunnel is assigned a Rice Internet address, sites accessed by the remote user through the tunnel will appear to be accessed from Rice instead of from the remote user's Internet access.
Posted by jahangir1983



Posted by jahangir1983

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Which of the following is used to identify PVCs?
what are the two advantage over connection oriented service?
 
Explain Public Safety Answering Point (PSAP)?
 


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved