Diseño De Una VPN Para El Acceso a Las Bases De Datos Científicas De La Universidad Nacional De Loja

Total Page:16

File Type:pdf, Size:1020Kb

Diseño De Una VPN Para El Acceso a Las Bases De Datos Científicas De La Universidad Nacional De Loja UNIVERSIDAD TT-CIS NACIONAL DE LOJA Área de la Energía, las Industrias y los Recursos Naturales No Renovables _____________________________________________________________________ CARRERA DE INGENIERÍA EN SISTEMAS Diseño de una VPN para el acceso a las bases de datos científicas de la Universidad Nacional de Loja. TESIS PREVIA A OBTENER EL TÍTULO DE INGENIERO EN SISTEMAS. Autor: Henry Daniel Quezada Lozano. Director: Ing. Mario Andrés Palma Jaramillo, Mg. Sc. LOJA - ECUADOR 2016 CERTIFICACIÓN DEL DIRECTOR Ing. Mario Andrés Palma Jaramillo, Mg. Sc. DOCENTE DE LA CARRERA DE INGENIERÍA EN SISTEMAS CERTIFICA: Que el Sr. Henry Daniel Quezada Lozano ha trabajado bajo mi tutoría el presente trabajo de titulación (TT), previo a la obtención del título de Ingeniero en Sistemas, cuyo tema versa sobre “Diseño de una VPN para el acceso a las bases de datos científicas de la Universidad Nacional de Loja”, el mismo que ha sido dirigido, orientado y discutido bajo mi asesoramiento y cumple con la reglamentación pertinente, razones por las cuales reúne la suficiente validez técnica y práctica, por consiguiente autorizo su certificación para su posterior presentación y sustentación. Loja, 22 de marzo de 2016. Ing. Mario Andrés Palma Jaramillo, Mg. Sc. DIRECTOR DE TESIS II AUTORÍA Yo, HENRY DANIEL QUEZADA LOZANO, declaro ser autor del presente trabajo de tesis y eximo expresamente a la Universidad Nacional de Loja y a sus representantes jurídicos de posibles reclamos o acciones legales por el contenido del mismo. Adicionalmente acepto y autorizo a la Universidad Nacional de Loja, la publicación de mi tesis en el Repositorio Institucional – Biblioteca Virtual. Firma: Cédula: 1104872815. Fecha: 25-10-2016. III CARTA DE AUTORIZACIÓN DE TESIS POR PARTE DEL AUTOR, PARA LA CONSULTA, REPRODUCCIÓN PARCIAL O TOTAL Y PUBLICACIÓN ELECTRÓNICA DEL TEXTO COMPLETO. Yo, HENRY DANIEL QUEZADA LOZANO, declaro ser autor de la tesis titulada: DISEÑO DE UNA VPN PARA EL ACCESO A LAS BASES DE DATOS CIENTÍFICAS DE LA UNIVERSIDAD NACIONAL DE LOJA, como requisito para optar al grado de INGENIERO EN SISTEMAS; autorizo al Sistema Bibliotecario de la Universidad Nacional de Loja para que con fines académicos, muestre al mundo la producción intelectual de la Universidad, a través de la visibilidad de su contenido de la siguiente manera en el Repositorio Digital Institucional: Los usuarios pueden consultar el contenido de este trabajo en el RDI, en las redes de información del país y del exterior, con las cuales tenga convenio la Universidad. La Universidad Nacional de Loja, no se responsabiliza por el plagio o copia de las tesis que realice el tercero. Para constancia de esta autorización, en la ciudad de Loja, a los veinticinco días del mes de octubre del dos mil dieciséis. Firma: Autor: Henry Daniel Quezada Lozano. Cédula: 1104872815. Dirección: Loja, (Av. 8 de Diciembre: entrada colegio militar). Correo Electrónico: [email protected]. Teléfono: 2540374. Celular: 0990205116. DATOS COMPLEMENTARIOS Director de Tesis: Ing. Mario Andrés Palma Jaramillo, Mg. Sc. Tribunal de Grado: Ing. Hernán Leonardo Torres Carrión, Mg. Sc. Ing. Mario Enrique Cueva Hurtado, Mg. Sc. Ing. Gastón René Chamba Romero, Mg. Sc. IV DEDICATORIA Dedico el presente trabajo de titulación a mis padres, quienes han sido el pilar fundamental de mi vida, me han cuidado, me han brindado todas las facilidades económicas para realizar mis estudios y me han dado su apoyo incondicional. A Dios, quien me ha permitido seguir alcanzando éxitos, por protegerme, por darme salud y estar presente en el transcurso de los años que llevo con vida. A mis amigos, quienes han estado presentes durante estos años de universidad, me han ayudado, aconsejado y han sido un aporte esencial para este logro. Henry Quezada V AGRADECIMIENTO Agradezco a Dios por darme la oportunidad de tener vida y lograr culminar la meta propuesta desde que inicie la universidad, por permitirme contar con mis padres y hermanas quienes han sido un baluarte en mi desarrollo personal y profesional. A la Universidad Nacional de Loja por haberme cobijado durante estos seis años de estudio y haberme capacitado tanto en el campo profesional como en valores éticos y morales. A mi director de tesis Ing. Mario Palma quien sin su ayuda y guía no hubiera logrado culminar con éxito el presente trabajo de titulación. Agradezco a mis compañeros y amigos quienes me han brindado su apoyo incondicional durante los años de estudio y han sido uno de los pilares fundamentales para el presente logro académico. Henry Quezada VI Índice de Contenidos Índice General CERTIFICACIÓN DEL DIRECTOR................................................................................... II AUTORÍA………………………………………………………………………………………. III CARTA DE AUTORIZACIÓN DE TESIS POR PARTE DEL AUTOR, PARA LA CONSULTA, REPRODUCCIÓN PARCIAL O TOTAL Y PUBLICACIÓN ELECTRÓNICA DEL TEXTO COMPLETO. .............................................................................................. IV DEDICATORIA ................................................................................................................. V AGRADECIMIENTO ........................................................................................................ VI Índice de Contenidos .......................................................................................................VII 1. Título ...................................................................................................................... 1 2. Resumen................................................................................................................ 2 Summary……………………………………………………………………………………….. 3 3. Introducción ........................................................................................................... 4 4. Revisión de Literatura............................................................................................ 6 4.1. CAPÍTULO I: REDES PRIVADAS VIRTUALES. .................................................. 6 4.1.1. Definiciones Generales. ........................................................................................ 6 4.1.2. Casos de Éxito Internacionales. .......................................................................... 11 4.1.2.1. Caso de éxito 1: Servicio de Red Privada Virtual para la Universidad de Cádiz, España. ............................................................................................................... 11 4.1.2.2. Caso de éxito 2: Red Privada Virtual de la Universidad de Valencia, España………………………………………………………………………………………… 13 4.1.2.3. Caso de éxito 3: Acceso externo a los recursos electrónicos de la Universidad de Sevilla vía VPN...................................................................................... 15 4.1.3. Casos de Éxito Nacionales.................................................................................. 17 4.1.3.1. Caso de éxito 1: Servicio de Red Privada Virtual (VPN) Institucional de la Universidad Católica de Cuenca (UCACUE). ................................................................ 17 VII 4.1.3.2. Caso de éxito 2: Sistema para Acceso Externo a Bases Digitales de la Universidad de Cuenca. ................................................................................................. 19 4.1.4. Herramientas VPN Open Source. ....................................................................... 21 4.1.4.1. Herramienta LogMeIn Hamachi. .................................................................. 21 4.1.4.2. Herramienta Itshidden VPN. ........................................................................ 23 4.1.4.3. Herramienta TorVPN. ................................................................................... 25 4.1.4.4. Herramienta The Securepoint TERRA......................................................... 27 4.1.4.5. Herramienta Your – Freedom. ..................................................................... 29 4.1.4.6. Herramienta SoftEther VPN. ........................................................................ 30 4.1.4.7. Herramienta ExpressVPN. ........................................................................... 32 4.1.4.8. Herramienta OAST. ...................................................................................... 34 4.1.4.9. Herramienta VPNBOOK. .............................................................................. 36 4.1.4.10. Herramienta OpenVPN Access Server........................................................ 37 4.2. CAPÍTULO II: ARQUITECTURAS, TIPOS Y PROTOCOLOS DE TÚNEL DE LAS REDES PRIVADAS VIRTUALES................................................................................... 41 4.2.1. Tipos de Redes Privadas Virtuales. .................................................................... 41 4.2.1.1. VPN basada en hardware. ........................................................................... 42 4.2.1.2. VPN basada en firewall. ............................................................................... 42 4.2.1.3. VPN basada en software.............................................................................. 43 4.2.2. Arquitecturas de Redes Privadas Virtuales. ....................................................... 43 4.2.2.1. Red Privada Virtual de Acceso Remoto. ..................................................... 43 4.2.2.2. Red Privada Virtual Sitio a Sitio. .................................................................. 44 4.2.2.3. Red Privada Virtual Interna (over LAN). ...................................................... 45 4.2.3.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • Implementation Single Account Pdc Vpn Based on Ldap
    IMPLEMENTATION SINGLE ACCOUNT PDC VPN BASED ON LDAP Gregorius Hendita Artha Kusuma Teknik Informatika, Fakultas Teknik Universitas Pancasila [email protected] Abstrak Data is an important for the company. Centralized data storage to facilitate users for accessing data in the company. Data will be stored centrally with PDC (Primary Domain Controller). Build communicate between head office and branch office requires high cost for each connection is not enough to ensure safety and security of data. Exchange data between head office and branch office should be kept confidential. VPN (Virtual Private Network) makes communication more efficient, not only the cost affordable that connection, security and safety will be the primary facility of VPN (Virtual Private Network). Service were established in the system will be integrated using LDAP (Lightweight Directory Access Protocol) to create a single account in each services such as PDC (Primary Domain Controller) and VPN (Virtual Private Network). The purposes of this final project to design and implementation a system centralized data storage and build communicate between head office and branch office are integrated with LDAP (Lighweight Active Directory Protocol). Hopefully this system can give more advantage to each network users. Keyword: PDC, VPN, LDAP, Single Account. I. Introduction previous workstations. To support the performance of the employees of the company of course has a Centralized data storage makes it easy for users variety of network services are formed in it such as to access data. many companies need a ftp, mail server, file sharing etc. These services of centralized storage system, because the data is course have their respective accounts.
    [Show full text]
  • Usporedba Linux I Microsoft Poslužiteljske Infrastrukture Kao Potpore Poslovanju Malih Tvrtki
    USPOREDBA LINUX I MICROSOFT POSLUŽITELJSKE INFRASTRUKTURE KAO POTPORE POSLOVANJU MALIH TVRTKI Stanešić, Josip Undergraduate thesis / Završni rad 2020 Degree Grantor / Ustanova koja je dodijelila akademski / stručni stupanj: Algebra University College / Visoko učilište Algebra Permanent link / Trajna poveznica: https://urn.nsk.hr/urn:nbn:hr:225:716198 Rights / Prava: In copyright Download date / Datum preuzimanja: 2021-10-02 Repository / Repozitorij: Algebra Univerity College - Repository of Algebra Univerity College VISOKO UČILIŠTE ALGEBRA ZAVRŠNI RAD Usporedba Linux i Microsoft poslužiteljske infrastrukture kao potpore poslovanju malih tvrtki Josip Stanešić Zagreb, veljača 2020. Pod punom odgovornošću pismeno potvrđujem da je ovo moj autorski rad čiji niti jedan dio nije nastao kopiranjem ili plagiranjem tuđeg sadržaja. Prilikom izrade rada koristio sam tuđe materijale navedene u popisu literature, ali nisam kopirao niti jedan njihov dio, osim citata za koje sam naveo autora i izvor, te ih jasno označio znakovima navodnika. U slučaju da se u bilo kojem trenutku dokaže suprotno, spreman sam snositi sve posljedice, uključivo i poništenje javne isprave stečene dijelom i na temelju ovoga rada. U Zagrebu 1. veljače 2020. Josip Stanešić Predgovor Želio bih se zahvaliti svom mentoru i profesoru Vedranu Dakiću, profesorima Silviju Papiću i Jasminu Redžepagiću kao i svim ostalim profesorima na uloženom trudu, prenesenom znanju i odličnom preddiplomskom studiju. Također se želim zahvaliti obitelji na svoj podršci pruženoj tijekom studija. Prilikom uvezivanja rada umjesto ove stranice ne zaboravite umetnuti original potvrde o prihvaćanju teme završnog rada kojeg ste preuzeli u studentskoj referadi Sažetak Male tvrtke osnova su ekonomije Europe. U suvremenom poslovanju IT tehnologija i samim time IT infrastruktura nužni su za poslovanje čak i u tvrtkama kojima osnovna djelatnost nije u području informacijsko-komunikacijskih tehnologija.
    [Show full text]
  • Webrtc IP Address Leaks Nasser Mohammed Al-Fannah Information Security Group Royal Holloway, University of London Email: [email protected]
    1 One Leak Will Sink A Ship: WebRTC IP Address Leaks Nasser Mohammed Al-Fannah Information Security Group Royal Holloway, University of London Email: [email protected] Abstract—The introduction of the WebRTC API to modern browsers and mobile applications with Real-Time Commu- browsers has brought about a new threat to user privacy. nications (RTC) capabilities1. Apparently, identifying one or WebRTC is a set of communications protocols and APIs that provides browsers and mobile applications with Real-Time Com- more of the client IP addresses via a feature of WebRTC was 2 munications (RTC) capabilities over peer-to-peer connections. first reported and demonstrated by Roesler in 2015. In this The WebRTC API causes a range of client IP addresses to paper we refer to the WebRTC-based disclosure of a client IP become available to a visited website via JavaScript, even if a address to a visited website when using a VPN as a WebRTC VPN is in use. This is informally known as a WebRTC Leak, Leak. and is a potentially serious problem for users using VPN services The method due to Roesler can be used to reveal a for anonymity. The IP addresses that could leak include the client public IPv6 address and the private (or local) IP address. number of client IP addresses via JavaScript code executed The disclosure of such IP addresses, despite the use of a VPN on a WebRTC-supporting browser. Private (or internal) IP connection, could reveal the identity of the client as well as address(es) (i.e. addresses only valid in a local subnetwork) enable client tracking across websites.
    [Show full text]
  • Express Vpn for Windows 10 Download How to Get an Expressvpn Free Trial Account – 2021 Hack
    express vpn for windows 10 download How to Get an ExpressVPN Free Trial Account – 2021 Hack. The best way to make sure ExpressVPN is the right VPN for you is to take it for a test drive before you commit and make sure its features fit your needs. Unlike some other VPNs, ExpressVPN doesn’t have a standard free trial. But it does have a no-questions-asked, 30-day money-back guarantee. So you can test out the VPN with no limitations, risk-free. If at any point during those 30 days, you decide that ExpressVPN isn’t right for you, you can just request a refund. This is super simple: I’ve tested it using several accounts, and got my money back every time. ExpressVPN Free Trial : Quick Setup Guide. It’s easy to set up ExpressVPN and get your 30 days risk-free. Here’s a step-by-step walkthrough that will have you ready in minutes. Head over to the ExpressVPN free trial page, and select, “Start Your Trial Today” to go right to their pricing list. Choose your subscription plan length, and then enter your email address and payment details. Note that longer plans are much cheaper. ExpressVPN’s long-term plans are the most affordable. It’s easy to download the app to your device. The set up for the ExpressVPN app is simple, and fast. Request a refund via live chat. Try ExpressVPN risk-free for 30-days. Free Trial Vs. Money-Back Guarantee. The trial period for ExpressVPN is really a 30-day money-back guarantee, but this is better than a free trial.
    [Show full text]
  • Windows Server 2012 R2 Directaccess
    Windows Server 2012 R2 DirectAccess Deployment Guide UPDATED: 25 March 2021 Windows Server 2012 R2 DirectAccess Copyright Notices Copyright © 2002-2021 Kemp Technologies, Inc. All rights reserved. Kemp Technologies and the Kemp Technologies logo are registered trademarks of Kemp Technologies, Inc. Kemp Technologies, Inc. reserves all ownership rights for the LoadMaster and Kemp 360 product line including software and documentation. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 kemp.ax 2 Copyright 2002-2021, Kemp Technologies, All Rights Reserved Windows Server 2012 R2 DirectAccess Table of Contents 1 Introduction 5 1.1 Document Purpose 5 1.2 Intended Audience 5 1.3 Related Firmware Version 5 1.4 About the Author 6 1.5 Assumptions 6 2 Load Balancing DirectAccess 7 2.1 Example Environment Setup 8 2.2 Prerequisites 9 3 Virtual Service Configuration 10 3.1 Enable Subnet Originating Requests Globally 10 3.2 Configure DirectAccess for Load Balancing 11 3.3 Configure the Servers Virtual Services 11 3.3.1 Configure a DirectAccess Server Virtual Service 12 3.3.2 Configure an Additional Virtual Service for the DirectAccess Server 13 3.3.3 Configure a Network Location Server (NLS) Virtual Service 14 3.3.4 Configure an NLS (Offloaded) Virtual Service 15 3.4 Configure DirectAccess to use a Load-Balanced NLS 17 3.5 Configure Geographic Load Balancing for NLS 18 4 Multisite Configuration and Load Balancing 22 4.1 Configure DirectAccess for Multisite 22 kemp.ax
    [Show full text]
  • WINDOWS® 8.1 in DEPTH Copyright © 2014 by Pearson Education, Inc
    Windows® 8.1 Brian Knittel Paul McFedries 800 East 96th Street Indianapolis, Indiana 46240 WINDOWS ® 8.1 IN DEPTH Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a Editor-in-Chief retrieval system, or transmitted by any means, electronic, mechanical, photo- Greg Wiegand copying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information con- Executive Editor tained herein. Although every precaution has been taken in the preparation of Rick Kughen this book, the publisher and author assume no responsibility for errors or omis- sions. Nor is any liability assumed for damages resulting from the use of the Development Editor information contained herein. Todd Brakke ISBN-13: 978-0-7897-5281-9 Managing Editor ISBN-10: 0-7897-5281-6 Sandra Schroeder Library of Congress Control Number: 2014930138 Printed in the United States of America Senior Project Editor Tonya Simpson First Printing: March 2014 Trademarks Copy Editor All terms mentioned in this book that are known to be trademarks or service Cheri Clark marks have been appropriately capitalized. Que Publishing cannot attest to the Senior Indexer accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Cheryl Lenser Windows is a registered trademark of Microsoft Corporation. Technical Editor Warning and Disclaimer Karen Weinstein Every effort has been made to make this book as complete and as accurate as Editorial Assistant possible, but no warranty or fitness is implied.
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • 19 Internet Activity
    1 Practical Paranoia: macOS 10.13 Security Essentials Author: Marc Mintz Copyright © 2016, 2017 by The Practical Paranoid, LLC. Notice of Rights: All rights reserved. No part of this document may be reproduced or transmitted in any form by any means without the prior written permission of the author. For information on obtaining permission for reprints and excerpts, contact the author at [email protected], +1 888.504.5591. Notice of Liability: The information in this document is presented on an As Is basis, without warranty. While every precaution has been taken in the preparation of this document, the author shall have no liability to any person or entity with respect to any loss or damage caused by or alleged to be caused directly or indirectly by the instructions contained in this document, or by the software and hardware products described within it. It is provided with the understanding that no professional relationship exists and no professional security or Information Technology services have been offered between the author or the publisher and the reader. If security or Information Technology expert assistance is required, the services of a professional person should be sought. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the author was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified in this document are used in editorial fashion only and for the benefit of such companies with no intention of infringement of trademark.
    [Show full text]
  • 106-Atvar Jattana.Cdr
    Research Paper Engineering E-ISSN No : 2454-9916 | Volume : 3 | Issue : 5 | May 2017 VPNBROADBANDLANSHARINGWITHWI-FINANOBASED USBADAPTER Atvar Singh 1 | C.Er. Harisharan Aggarwal 2 1 Department of Electronics and Communication Engg., Guru Gobind Singh College Of Engg. & Technology, Guru kashi University, Talwandi sabo, Bathinda, Punjab, India. 2 HOD, Department of Electronics and Communication Engg., Guru Gobind Singh College Of Engg. & Technology, Guru kashi University, Talwandi sabo, Bathinda, Punjab, India ABSTRACT Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN (wimax) technology to enable remote users to securely connect to a private network. Many corporations are very seriously concerned about VPN security of networks. In this regards, the VPN (wimax) modem and antenna standard was developed to the standard address the security problems, no doubts virtual private networking is famous for good security for the clients past few years. But VPN Broadband connection is a major problem not make a multiuser clients, because it is a single user. In the thesis work ,VPN (wimax) broadband internet connect through Wi-Fi on android mobile with the help of nano technology based mini adapter clients sharing a broadband LAN also we make with the help of nano adapter make a multiuser KEYWORDS: Wimax antenna, Broadband VPN, Nano mini adapter(IEEE 802.11) I. INTRODUCTION Service (QOS) management over the Internet can cause packet loss and other per- A Virtual private network (VPN) extends a private network across a public net- formance issues.
    [Show full text]
  • F5 and Windows Server 2012 Directaccess/Remote Access Services
    White Paper F5 and Windows Server 2012 DirectAccess/Remote Access Services The F5 BIG-IP platform provides high availability, performance, and scalability when used to deliver traffic management and load balancing for the Microsoft Windows Server 2012 Remote Access Solutions: DirectAccess and Remote Access Services. by Ryan Korock Technical Director, Microsoft Solutions White Paper F5 and Windows Server 2012 Direct Access/Remote Access Services Contents Introduction 3 Benefits of Using F5 Products with DirectAccess and VPN 3 Architecture 4 A DirectAccess/VPN Server Front End 5 A Layered Approach with DirectAccess/VPN Servers 5 Dual Interface Vs. Single Interface DirectAccess/VPN Deployments 6 Single Site Vs. Multisite Deployment 8 Conclusion 9 2 White Paper F5 and Windows Server 2012 Direct Access/Remote Access Services Introduction For Windows 8 and Windows Server 2012, Microsoft has taken two remote access technologies found in previous versions of Windows Server, DirectAccess and VPN Server, and pulled them under the same management umbrella called simply Remote Access. F5 technologies can be deployed to manage traffic and balance loads on these services. Originally introduced in Windows Server 2008 R2 and Windows 7, DirectAccess shifted previous remote access technology. Unlike traditional VPNs, in which connections have been manually initiated at the user level, DirectAccess makes use of a seamless, system-level connection. This means that remote, domain-joined systems will automatically and securely build a corporate network presence upon boot. VPN, formerly known as Remote Access Services (RAS), was introduced in Windows NT and includes the traditional Windows VPN technologies, including IKEv2, SSTP, PPTP, and L2TP. Windows Server 2012 customers can deploy DirectAccess, VPN, or both, and it is often beneficial to deploy both.
    [Show full text]