⚫This process is called tunneling as it uses a secure means to tunnel through a publicly accessible network
⚫It uses encryption involves the use of private and / or public keys
⚫scrambles data so that only the key holder can decrypt / understand it
⚫data remains encrypted throughout transmission and is only decrypted at
the destination computer
⚫It can use IPsec Internet Protocol Security
⚫is a network protocol suite that encrypts packets of data sent over a
network
⚫protects data flows between a pair of hosts (host-to-host)
⚫ It uses a firewall which (monitors and) controls the incoming and outgoing network traffic
⚫establishes a barrier between a trusted, secure internal network and
another outside network or computer
⚫It uses authentication, authorization, and accounting / AAA «
⚫AAA server is a program that handles user requests for access to
computer resources «
⚫AAA server typically interacts with network access and gateway servers /
with databases and directories containing user information
⚫It can use TLS / SSL «
⚫« uses asymmetric encryption to establish the session «
⚫« symmetric encryption for the main conversation.
Comments
Post a Comment