Results 111 to 120 of about 1,966 (130)
Some of the next articles are maybe not open access.

QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method

2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2022
Setiyo Budiyanto
exaly   +2 more sources

IMPLEMENTASI VPN SERVER MENGGUNAKAN PROTOKOL L2TP DAN IPSEC PADA PT. MULTI TERMINAL INDONESIA

Jurnal Teknologi Informasi
This research was conducted with the aim of assisting in the activation and security of hardware and software devices using a VPN L2TP/IPSec server and client network. namely configuring a Mikrotik router network based on VPN L2TP/IPSec server and client, by connecting two public networks into one local network.
exaly   +2 more sources

Analysis of Streaming Video on VPN Networks Between OpenVPN and L2TP/IPSec

2021 IEEE 7th Information Technology International Seminar (ITIS), 2021
Henni Endah Wahanani   +2 more
exaly   +2 more sources

CPN modeling and analysis of L2TP

Proceedings 2001 International Conference on Computer Networks and Mobile Computing, 2002
L2TP is an important tunneling protocol in IP VPN. Coloured Petri nets (CPN) is a well- suited formal approach for modeling and analysis of network protocol. Upon the introduction to CPN and L2TP hierarchical and timed CPN is used to create the model of L2TP Then the occurrence graph is analyzed. With this model, we test the protocol behavior to verify
null Yongwei Wang   +3 more
openaire   +1 more source

A DoS-vulnerability analysis of L2TP-VPN

The Fourth International Conference onComputer and Information Technology, 2004. CIT '04., 2004
L2TP is an IETF standard-track VPN protocol defined by RFC2661. Because L2TP does not always authenticate the control and data messages, both of the control and data packets of L2TP protocol are vulnerable to attack. This paper identifies two types of attacks that disconnect L2TP tunnels and proposes countermeasures.
A. Kara   +3 more
openaire   +1 more source

Navigating the VPN Landscape: A Comparative Study of L2TP, IPSec, and MPLS VPN Technologies

2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS)
Yungui Chen   +3 more
exaly   +2 more sources

Research on Authentication Security of Wireless Local Area Network Based on L2TP Protocol

2009 IITA International Conference on Services Science, Management and Engineering, 2009
Wireless LAN is considered an unreliable network there are some flaws in access authentication and data security,we put forward a method based on the improvement L2TPVPN to access wireless, the way uses double-sided type of authentication and similarity mppe encryption way, improves authentication security of accessing and data transporting, and ...
Yan Niu, Jun Li, Lala Li
openaire   +1 more source

Building mobile L2TP/IPsec tunnels

Wireless networks introduce a whole range of challenges to the traditional TCP/IP network, especially Virtual Private Network (VPN). Changing IP address is a difficult issue for VPNs in wireless networks because IP addresses are used as one of the identifiers of a VPN connection and the change of IP addresses will break the original connection.
openaire   +1 more source

L2TP/IPsec Interworking

International Journal of Scientific Research, 2012
openaire   +1 more source

Protocole L2TP

Réseaux Télécommunications, 2006
openaire   +1 more source

Home - About - Disclaimer - Privacy