Results 241 to 250 of about 107,397 (277)
Some of the next articles are maybe not open access.
2023
The topic of the final paper was the implementation of the IPsec (Internet Protocol Security) protocol in a Virtual Private Network (VPN) with the aim of establishing communication between three locations. IPsec was developed as a foundation for ensuring authentication, integrity, and reliability of communication, as well as protecting traffic at the ...
openaire +1 more source
The topic of the final paper was the implementation of the IPsec (Internet Protocol Security) protocol in a Virtual Private Network (VPN) with the aim of establishing communication between three locations. IPsec was developed as a foundation for ensuring authentication, integrity, and reliability of communication, as well as protecting traffic at the ...
openaire +1 more source
2021
This chapter describes the requirements for IPsec VPN using NSX-T and identifies the different VPN types. It also describes how to create and configure Layer-3 IPsec VPN tunnels and Layer-2 VPN (L2VPN) tunnels.
openaire +1 more source
This chapter describes the requirements for IPsec VPN using NSX-T and identifies the different VPN types. It also describes how to create and configure Layer-3 IPsec VPN tunnels and Layer-2 VPN (L2VPN) tunnels.
openaire +1 more source
2022
Wireguard ist ein neues Virtual Private Network von dem seine Entwickler behaup-ten es sei leicht zu bedienen, schnell und besitze hohe Sicherheits-Standards. Es kann unter Windows, MacOs, Linux and sogar den häufigsten mobilen Betriebssystemen wie Android und iOS installiert werden.
openaire +1 more source
Wireguard ist ein neues Virtual Private Network von dem seine Entwickler behaup-ten es sei leicht zu bedienen, schnell und besitze hohe Sicherheits-Standards. Es kann unter Windows, MacOs, Linux and sogar den häufigsten mobilen Betriebssystemen wie Android und iOS installiert werden.
openaire +1 more source
Layer 1 VPN NMS Based on Each VPN Customer
2008A virtual private network (VPN) makes it possible for a customer to use a wide range network by borrowing a provider network. In addition, by recent emergence of the layer 1 VPN (L1VPN), more customers require to control the end-to-end path setting on VPN by using path computation traffic engineering.
Hiroshi Matsuura, Naotaka Morita
openaire +1 more source
2022
The topic of this final paper is VPN (Virtual Private Network). The target is to show general knowledge about VPN networks. The method of application of networks, their advantages and disadvantages compared to the other networks, and data routing protocols.
openaire +1 more source
The topic of this final paper is VPN (Virtual Private Network). The target is to show general knowledge about VPN networks. The method of application of networks, their advantages and disadvantages compared to the other networks, and data routing protocols.
openaire +1 more source
2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM), 2023
Divya Kulkarni +5 more
openaire +1 more source
Divya Kulkarni +5 more
openaire +1 more source
Proceedings of the 4th international conference conference on Computer systems and technologies e-Learning - CompSysTech '03, 2003
Multi-Protocol Label Switching (MPLS) VPN monitoring becomes more and more important with the fast growth of the usage of this technology. The paper describes the main approaches for effective monitoring ef MPLS VPNs and their characteristics.
openaire +1 more source
Multi-Protocol Label Switching (MPLS) VPN monitoring becomes more and more important with the fast growth of the usage of this technology. The paper describes the main approaches for effective monitoring ef MPLS VPNs and their characteristics.
openaire +1 more source
Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers
Passive and Active Network Measurement Conference, 2023Etienne Khan +3 more
semanticscholar +1 more source

