Tunneling's technological conjugate and enkripsi makes VPN( Virtual Private Network) as technology which admirably and helps user work myriad it.
Both of its technology non-negotiable and discomfited sue again in forms one VPN'S communication. Both of technology it shall be fused to get perfect result, which is safe data communication and efficient. Safe meaning Your data secrecies awake regular and its perfection. Are not bungling side get to catch and reads Your data, even that data then grass at public communication band. Constant perfection awake fathoms a meaning not bungling person get to confound content and Your data path. It needs to be looked after since if was passing public band, a great many fad person
one that maybe just destroy Your midway data. To that is, why technology second this really gets essential role in be formed VPN'S communication solution.
Any kind Technology Tunneling?
To make one tunnel, necessary one its regulator protocol so tunnel logically it gets to walk with every consideration such as connection point to point actually. Now, in store maker protocol myriad tunnel who can be utilized. But, tunneling protocol that commonest and at most is utilized consisting of three types hereunder:
Initially, all product Cisco utilizes L2F to manage that tunneling, meanwhile operating system is antecedent Microsoft just utilizes PPTP to service its user that wants to play by tunnel. But currently, Windows NT's Microsoft / 2000 got utilizes PPTP or L2TP in technological that VPN.
L2TP usually being utilized deep makes Virtual Private Dial Network (VPDN) one that gets to work takes in all communications protocol type at in it. Besides, L2TP also gets independent media character because get to above work any media. L2TP enables its user for regular can connected with local network theirs with policy same security and of whichever they lie, via VPN'S connection or VPDN. This connection oft is looked on as medium lengthen local network belongs to its user, but passes through public media.
But, this tunneling's technology have no mechanism to provide enkripsi's facility because really quite a pure just form tunnel's network. Besides, what last grass in tunnel this can be a prey to and be monitored by use of protocol analizer.
By use of tunneling GRE, router is aught at the end tunnel does enkapsulation other protocol packages in header of IP protocol. It will make package previously get to be taken in to whichever by and method that exist on IP technology. With marks sense this ability, therefore protocol which took in by that IP package gets free more move to go to whichever location which is wended, provided that achievable IP addressing ala.
Quite a lot application utilize tunneling's protocol help this is merge local network that separatedly distance ala is back get to get communication. Or in other words, GRP there are many is utilized to lengthen and mengekspansi is proprietary local network the its user. Even quite a lot is utilized, GRE not also provide enkripsi's system grasses last data at its tunnel, so all its data activity can monitor to utilize protocol analyzer so-so.
IPSec provides data security system as it by use of one peacemaker method that named Internet Goes To y. Exchange (IKE). IKE this on call to handle negotiation problem of protocol and security algorithm that is created bases from policy which is applied on network the user. IKE on eventually will result one enkripsi's system and its peacemaker key that will be utilized for autentikasi on this IPSec's system.
How with Enkripsinya's Technology?
Besides technology tunneling, enkripsi's technology in VPN also highly varied. Actually technological enkripsi is not just belonging VPN just, but far-flung its purpose. Enkripsi on call to look after privasi and that data secrecy can't with easy to read by side that don't deserve. Marginally tech enkripsi is divided up two types, which is:
Symmetric Encryption
Symmetric Encryption is known even with nickname one diarrhoea goes to y. encryption. Enkripsi is this type a lot of is utilized deep enkripsi's process data in volumed one outgrows. Up to data communication term, network peripheral that have enkripsi's ability this type will change data that as text of purification (cleartext) as gets text form already at random or its terminology is ciphertext. This random text obviously been made by use of algorithm. This random text really is not easily to be read, so Your data security awakes.
Succeeding question, how is that random data opened by really party be wended? To open this random data, seeker's algorithm previously also makes one key which can open all content in origin. This key proprietary by the consigner and also data consignee. Key this is that will be utilized deep enkripsi's process and dekripsi ciphertext it.
Digital Encryption Default (DES) constitute one standard algorithm that is utilized to make this symmetric encryption's process. This algorithm at claim as one commonest being utilized currently. DES'S algorithm operating deep measure 64 bit obstructs data. Fathom a meaning, this algorithm will carry on one series of randomization process 64 incoming data bits for then is issued as 64 random data bits. That process utilizes 64 bit key whereabouts 56 its bit be chosen at random, 8 its bit comes from parity bits of Your data. Bit eighth that was slipped bit 56th betwixt previous.
Resulting key then is sent to data consignee.
With enkripsi's system such, DES is not easy to be conquered But along with technology developing, DES can be uncovered by use of supercomputer in the period of few days only. Alternative for DES is triple DES (3DES) one that do process in DES as much thrice. So key which is resulted and is needed to open enkripsi is as much three numbers.
Asymmetric Encryption
Enkripsi is this type is frequent at conceive of system public goes to y. encryption. enkripsi's process this type can utilize algorithm any kind, but enkripsi's result of this algorithm will function as complement in to seeker and data collation. In enkripsi this type is needful two peacemaker keys that variably, but mutually gets bearing in processes its algorithm. Both of this peacemaker key is frequent so-called with Public's terminology Goes To y. and Private Goes To y..
For example it, Andi and Kindness wants to get safe communication by use of system enkripsi this. To it, both has to have public goes to y. and private goes to y. beforehand. Andi shall have public and private goes to y., so even with Kindness. While processes communication be begun, they will utilize keys that variably to enkrip and dekrip is data. Key may variably, but data get flawlessly been delivered same algorithm blessing.
Public's makings mechanism and private goes to y. this complex enough. Usually goes to y. to y. this at generate utilizes going generator RSA'S algorithm (Ron Rivest, Adi Shamir, Leonard Adleman) or EL Gamal. Result of this generator usually is two random numeral formations huge ones. One random number functions as public goes to y. and one again for private to go to y.. This random numbers really have as much been made and as random as maybe to strengthen uniquenesses of go to y. to y. You.
To genberationi goes to y. to y. this really need tall CPU process. Therefore that, this process can't be done every time You do data transactions. In other words, enkripsi is this type never been utilized to secure data truthfully because its complex character it. Even so, enkripsi this will so effective in autentikasi's process data and its application that involve signature's digital system and goes to y. management.
How Choose VPN'S Technology in point?
VPN'S technology so a lot of its option for You to utilize. How choose the best one for You? VPN'S technology the best one for Your really clings to traffic's requirement data that wants then grass at its settle.
IPSec's technology constitute main option and the most complete to give solution for VPN'S network enterprise's level. But unhappily, IPSec just backs up traffic that berbasiskan IP and package technology that gets unicast's characteristic only. So if characteristic Your data that wants to be overlooked by appropriate VPN with competence IPSec, therefore not necessarily again utilizes it because IPSec easier relative at configuration and at troubleshoot. But if traffic You consisting of protocols besides IP or IP communication get multicast's characteristics, therefore utilizes GRE or L2TP.
Well-matched GRE is utilized if You want to make site to site VPN's communication that will be passed by various communications protocol kind. Besides, GRE also well-matched being utilized deep through multicast's IP package as one a lot of is utilized deep routing protocol. So match is utilized as band of communication among router. GRE that to enkapsulation will all traffic without source and aim care it.
For network what do a lot of impassable by traffic for stationary networking Microsoft, L2TP really close-fitting to be utilized in here. Since its relationship that hand in glove with PPP protocol, L2TP also well-matched being utilized deep build access VPN's remote that need multiprotokol's support.
But one becomes constraint be good GRE and also L2TP no that have enkripsi's system and data perfection keeper. Therefore of that, usually deep implementation both of this VPN'S technology merged by its purpose with IPSec to get enkripsi's facility and integrity keeper mechanism its data.
Safe and Comfortable
VPN really molded of second conjugate technological already been enlightened in broad outline upon. There is one principle which amends among data communication practitioner that says that “ safe data communication will never cozy ”. That principle maybe available its scorpion is right, whereabouts You shall make policy policy that dazes to carry the wind, tunneling's teches and enkripsi what do You will utilize, and rule rule what do so tights and play by play to stop all rioter that don't deserve to access Your data. But, technology VPN may can be counted out deep that principle.
Really correctness, performa is network VPN won't can as good as tissue personal truthfully. Big latensi time must espouse to whichever VPN goes. Besides, this network so sensitif to happening trouble midway entah whereabouts. But, all that risk still maybe accepted since if was connected, tremendous convenience You can enjoy. Moreover, to You practitioner carry on business, a great many business applications which can be made by use of VPN.
Read more....!
Posted by Admin, Tuesday, September 04, 2007 11:55:00 AM
| 2 comments |
Both of its technology non-negotiable and discomfited sue again in forms one VPN'S communication. Both of technology it shall be fused to get perfect result, which is safe data communication and efficient. Safe meaning Your data secrecies awake regular and its perfection. Are not bungling side get to catch and reads Your data, even that data then grass at public communication band. Constant perfection awake fathoms a meaning not bungling person get to confound content and Your data path. It needs to be looked after since if was passing public band, a great many fad person
one that maybe just destroy Your midway data. To that is, why technology second this really gets essential role in be formed VPN'S communication solution.
Any kind Technology Tunneling?
To make one tunnel, necessary one its regulator protocol so tunnel logically it gets to walk with every consideration such as connection point to point actually. Now, in store maker protocol myriad tunnel who can be utilized. But, tunneling protocol that commonest and at most is utilized consisting of three types hereunder:
• Layer 2 Tunneling Protocol (L2TP)
L2TP is one tunneling protocol who fuses and compounding two numbers tunneling protocol who gets proprietary's character, which is L2F (Layer 2 Forwarding) Cisco Systems's belonging with PPTP (Point to Point Tunneling Protocol) Microsoft's belonging.
Initially, all product Cisco utilizes L2F to manage that tunneling, meanwhile operating system is antecedent Microsoft just utilizes PPTP to service its user that wants to play by tunnel. But currently, Windows NT's Microsoft / 2000 got utilizes PPTP or L2TP in technological that VPN.
L2TP usually being utilized deep makes Virtual Private Dial Network (VPDN) one that gets to work takes in all communications protocol type at in it. Besides, L2TP also gets independent media character because get to above work any media. L2TP enables its user for regular can connected with local network theirs with policy same security and of whichever they lie, via VPN'S connection or VPDN. This connection oft is looked on as medium lengthen local network belongs to its user, but passes through public media.
But, this tunneling's technology have no mechanism to provide enkripsi's facility because really quite a pure just form tunnel's network. Besides, what last grass in tunnel this can be a prey to and be monitored by use of protocol analizer.
• Generic Routing Encapsulation (GRE)
tunneling's protocol this the one has ability to take in more than one addressing protocol type communication. Are not just package get even one internet protocol address get to be taken in it, but a lot of other protocol package as CNLP, IPX, and a lot of again. But, all that was packaged or to enkapsulation becomes one package which get IP addressing system. Then that package is distributed system thru also tunnel working above IP communications protocol.
By use of tunneling GRE, router is aught at the end tunnel does enkapsulation other protocol packages in header of IP protocol. It will make package previously get to be taken in to whichever by and method that exist on IP technology. With marks sense this ability, therefore protocol which took in by that IP package gets free more move to go to whichever location which is wended, provided that achievable IP addressing ala.
Quite a lot application utilize tunneling's protocol help this is merge local network that separatedly distance ala is back get to get communication. Or in other words, GRP there are many is utilized to lengthen and mengekspansi is proprietary local network the its user. Even quite a lot is utilized, GRE not also provide enkripsi's system grasses last data at its tunnel, so all its data activity can monitor to utilize protocol analyzer so-so.
• security Protocol's IP (IPSec)
IPSec is one for felicitous tunneling protocol option to be utilized deep VPN korporat's level. IPSec constitutes protocol that gets open's character default who can provide data security, data perfection, and autentikation is data among peer second that participates in it.
IPSec provides data security system as it by use of one peacemaker method that named Internet Goes To y. Exchange (IKE). IKE this on call to handle negotiation problem of protocol and security algorithm that is created bases from policy which is applied on network the user. IKE on eventually will result one enkripsi's system and its peacemaker key that will be utilized for autentikasi on this IPSec's system.
How with Enkripsinya's Technology?
Besides technology tunneling, enkripsi's technology in VPN also highly varied. Actually technological enkripsi is not just belonging VPN just, but far-flung its purpose. Enkripsi on call to look after privasi and that data secrecy can't with easy to read by side that don't deserve. Marginally tech enkripsi is divided up two types, which is:
Symmetric Encryption
Symmetric Encryption is known even with nickname one diarrhoea goes to y. encryption. Enkripsi is this type a lot of is utilized deep enkripsi's process data in volumed one outgrows. Up to data communication term, network peripheral that have enkripsi's ability this type will change data that as text of purification (cleartext) as gets text form already at random or its terminology is ciphertext. This random text obviously been made by use of algorithm. This random text really is not easily to be read, so Your data security awakes.
Succeeding question, how is that random data opened by really party be wended? To open this random data, seeker's algorithm previously also makes one key which can open all content in origin. This key proprietary by the consigner and also data consignee. Key this is that will be utilized deep enkripsi's process and dekripsi ciphertext it.
Digital Encryption Default (DES) constitute one standard algorithm that is utilized to make this symmetric encryption's process. This algorithm at claim as one commonest being utilized currently. DES'S algorithm operating deep measure 64 bit obstructs data. Fathom a meaning, this algorithm will carry on one series of randomization process 64 incoming data bits for then is issued as 64 random data bits. That process utilizes 64 bit key whereabouts 56 its bit be chosen at random, 8 its bit comes from parity bits of Your data. Bit eighth that was slipped bit 56th betwixt previous.
Resulting key then is sent to data consignee.
With enkripsi's system such, DES is not easy to be conquered But along with technology developing, DES can be uncovered by use of supercomputer in the period of few days only. Alternative for DES is triple DES (3DES) one that do process in DES as much thrice. So key which is resulted and is needed to open enkripsi is as much three numbers.
Asymmetric Encryption
Enkripsi is this type is frequent at conceive of system public goes to y. encryption. enkripsi's process this type can utilize algorithm any kind, but enkripsi's result of this algorithm will function as complement in to seeker and data collation. In enkripsi this type is needful two peacemaker keys that variably, but mutually gets bearing in processes its algorithm. Both of this peacemaker key is frequent so-called with Public's terminology Goes To y. and Private Goes To y..
For example it, Andi and Kindness wants to get safe communication by use of system enkripsi this. To it, both has to have public goes to y. and private goes to y. beforehand. Andi shall have public and private goes to y., so even with Kindness. While processes communication be begun, they will utilize keys that variably to enkrip and dekrip is data. Key may variably, but data get flawlessly been delivered same algorithm blessing.
Public's makings mechanism and private goes to y. this complex enough. Usually goes to y. to y. this at generate utilizes going generator RSA'S algorithm (Ron Rivest, Adi Shamir, Leonard Adleman) or EL Gamal. Result of this generator usually is two random numeral formations huge ones. One random number functions as public goes to y. and one again for private to go to y.. This random numbers really have as much been made and as random as maybe to strengthen uniquenesses of go to y. to y. You.
To genberationi goes to y. to y. this really need tall CPU process. Therefore that, this process can't be done every time You do data transactions. In other words, enkripsi is this type never been utilized to secure data truthfully because its complex character it. Even so, enkripsi this will so effective in autentikasi's process data and its application that involve signature's digital system and goes to y. management.
How Choose VPN'S Technology in point?
VPN'S technology so a lot of its option for You to utilize. How choose the best one for You? VPN'S technology the best one for Your really clings to traffic's requirement data that wants then grass at its settle.
IPSec's technology constitute main option and the most complete to give solution for VPN'S network enterprise's level. But unhappily, IPSec just backs up traffic that berbasiskan IP and package technology that gets unicast's characteristic only. So if characteristic Your data that wants to be overlooked by appropriate VPN with competence IPSec, therefore not necessarily again utilizes it because IPSec easier relative at configuration and at troubleshoot. But if traffic You consisting of protocols besides IP or IP communication get multicast's characteristics, therefore utilizes GRE or L2TP.
Well-matched GRE is utilized if You want to make site to site VPN's communication that will be passed by various communications protocol kind. Besides, GRE also well-matched being utilized deep through multicast's IP package as one a lot of is utilized deep routing protocol. So match is utilized as band of communication among router. GRE that to enkapsulation will all traffic without source and aim care it.
For network what do a lot of impassable by traffic for stationary networking Microsoft, L2TP really close-fitting to be utilized in here. Since its relationship that hand in glove with PPP protocol, L2TP also well-matched being utilized deep build access VPN's remote that need multiprotokol's support.
But one becomes constraint be good GRE and also L2TP no that have enkripsi's system and data perfection keeper. Therefore of that, usually deep implementation both of this VPN'S technology merged by its purpose with IPSec to get enkripsi's facility and integrity keeper mechanism its data.
Safe and Comfortable
VPN really molded of second conjugate technological already been enlightened in broad outline upon. There is one principle which amends among data communication practitioner that says that “ safe data communication will never cozy ”. That principle maybe available its scorpion is right, whereabouts You shall make policy policy that dazes to carry the wind, tunneling's teches and enkripsi what do You will utilize, and rule rule what do so tights and play by play to stop all rioter that don't deserve to access Your data. But, technology VPN may can be counted out deep that principle.
Really correctness, performa is network VPN won't can as good as tissue personal truthfully. Big latensi time must espouse to whichever VPN goes. Besides, this network so sensitif to happening trouble midway entah whereabouts. But, all that risk still maybe accepted since if was connected, tremendous convenience You can enjoy. Moreover, to You practitioner carry on business, a great many business applications which can be made by use of VPN.
Read more....!