Posted by on June 11th, 2009
Virtual Private Network-VPN is a network with a personal security Based on the public network. The network is both the entry point – the shared WAN systems such as personal on the Internet, existing Allows you to pay maintenance only WAN systems. Instead of having to charge the Internet.
Maybe you have heard the comparison data sent over the Internet. That similar messages were written on postcards. If you send a postcard with no cased seal. Not that anyone can pick up touch it read. Similarly, data on the Internet. Not that anyone with enough skill. Can steal your data is read the same. That unsafe
So if want more security. You must write it on paper. Sealed envelope and then put before the letterbox drop. Even if that requires a small additional effort. But no one see it. Similarly, the VPN system can protect your data. While traveling from one side to another side of the network.
Connect offices together.
The company includes headquarters. And sub-offices. This network, both connected to the Internet. These offices. Will have the option of a two-way data communication including the use of ISDN equipment division frame Rielis cable or T1 connection to each site. Of which is used widely. But the rental fee in line.
Alternatively, If both offices are connected to the Internet and LAN at the same time. You just set it to run on Windows 2000 server in each link of the VPN is compatible with the image preview of the system 1 that includes the server name WAN MAIN-OFFICE REMOTEOFFICE and to see a side in a sub-office services (Subnet. ) in the range between 172.16.0.1 to 172.16.0.254 Coast offices and sub-sub-range is 192.168.0.1 to the Internet 192.168.0.254. With Internet intermediary That you can use to create a VPN network in this article. Any address in the 10.xxx range is defined as a public Internet address.
We try to assume that Both sites are a permanent Internet connection. And a number of fixed IP from ISP. Even if you can Est VPN connection to work with Dial-up Internet, but the use of a permanent connection can be easier. And a fixed IP number is required for individual sites. Because you will need specific route information! Which require a fixed address.
Relate Link : LAN Proxy Server
- 05/07/2009 -- Config PPP Server on Linux (0)
Remote Access Server Overviews
RAS (Remote Access Server) is a system of communications services the remote computer. Is a connection from your computer to use Dialup Modem protocol PPP (Point-to-point Protocol) through a public telephone exchange network into the computer which may be Internet or Intranet-style has used this very popular service for Internet. ISP RAS, or equipment will be quite expensive. If take into account in a manner that is not business or work with no income or revenu...
- 15/06/2012 -- How to Setup a VPN Server (0)
How to setup a VPN Server
VPN or Virtual Private Network is a virtual private network. The structure of the public network. Or may be run on. IP networks, but also maintains its corporate network by encrypting the packets before sending them. To provide information. There are more secure.However, the VPN will cover both the hardware device (such as Gateway and Router), software and a firewall.
Encrypted packets. To the data. Secure it. There are several different mechanisms. This method o...
- 22/05/2009 -- Local Area Network (0)
Local Area Network a computer network linking together all the live medium. Divider network is a 2 form of belief is linked. Linking local short or LAN and WAN. Linked by a LAN network using the RJ45 to connect. (How to Crimp RJ45) Link remote or by networking with LAN-3 model
Bus-speed data transfer 10-100 MB / s to connect the signal lines on the same line. The device is called the T-Connector is a codec to import data into the computer and turn off the Terminator in the head end of the ...
- 26/06/2009 -- NetBIOS Part III (0)
NetBIOS Name Resolution Component
Computer will not be able to interact by using NetBIOS name NetBIOS name will need to convert the IP address value before they can reach the actual goal. This is the NetBIOS name resolution process is the user can not see the work of this process (transparent to the user) process is useful because it allows users to remember IP address value that is more difficult. Remember the NetBIOS name.
NBT has mechanisms to determine the IP address or NetBIOS name...
- 26/04/2009 -- Advantages of Wireless LAN (0)
Yesterday I talk about basic Wireless LAN Technology that useful? Today I will speak at the Wireless LAN Technology 2 Technology, which is content with current.
Advantages of Wireless LAN.
Wireless LAN technology for the benefits of the network when compared with normal-wired that enough delegates will have:
1. Mobility: Wireless LAN, users can connect into the network of organizations in all areas at any time within the signal coverage of Wireless LAN systems.
2. Simple & Quick Instal...
- 23/08/2009 -- How to crimp RJ45 (0)
UTP Connection (CAT 5) a very popular device is currently used for peripheral systems network. How to crimp UTP Connection:
How to crimp RJ45
Crimp Standard connectivity in a device such as a cable between the computer and the Switch or HUB. (T568B)
Cross-entry is to call or cross - Connection between the same type of equipment such as HUB to HUB, Switch To Swich computer or a computer we can use the computer with NoteBook. (T568A and T568B)
Plug / Jack - RJ45 - 568A
- 13/05/2009 -- TCP/IP Protocol (0)
TCP/IP Protocol Overviews
TCP / IP (Transmitsion Control Protocol / Internet Protocol) suite of protocols used to communicate over the Internet. The objective is to enable communication across the network from origin to destination. And can find the path to send data to them automatically. Although the way may be a network problem. Protocol still find another route to transmit data to the destination.
This protocol suite has been developed since 1960, which was first used in the ARPANET netw...
- 21/05/2009 -- Asynchronous Transfer Mode (0)
Asynchronous Transfer Mode Overviews
Asynchronous Transfer Mode: ATM network communications. A protocol name is the same as standard ATM data transmission speed by ATM has been developed for use with the look. Multiple data formats and require high-speed data transmission more. A data transmission speed from 2 Mbps to a Gbps network media in a call from Finance Co. yoke. Fiber cable coat. Or double cross lines (Twisted pair) has been developed by the ATM network packet switch (packet swit...
- 13/07/2009 -- Secure Shell Protocol (0)
Secure Shell Protocol Overviews
Secure Shell or SSH is a protocol for computer networks. Designed to log into another computer. And work. SSH is designed on a replacement for rlogin, TELNET and rsh for security reasons because SSH uses encryption methods to transmit information between devices.
Standard SSH port of SSH is port 22 also is the basis of other communications such as SFTP or SCP.
SSH Protocol History
1995 - ssh1 been invented by University of Tatu Ylonen. Technology Helsin...
- 22/06/2009 -- Port Scanning (0)
Port Scanning Overviews
Port Scanning is one of the most well-known techniques used to attack the service find that they can penetrate through to the system. Typically every system attached to a LAN or the Internet to be available both on the port that is known and not known for their attacks, the Port Scanning can find information from many systems. Goal: What services are running. Users who own those services. Support or not login with anonymous and service network is made. authentication o...
You can leave a response
, or trackback
from your own site.