Secure and Low Cost Virtual Connection Under Linux / Conectividade virtual segura e de baixo custo sob Linux

AUTOR(ES)
DATA DE PUBLICAÇÃO

2003

RESUMO

The business environment requires constant collaboration, between people and offices geographically spreaded. The corporative market has one more option for real time data transmission: the private network communications based on IP protocol. The VPN Virtual Private Network stands for the most suitable solution to reduction of costs, fundamental for small companies that cannot hire other connection types. A VPN Virtual Private Network should be integral part of the safety corporate package when the organization allows access to business partners, to customers and to internal or remote (telecommuters) employees into resources of the corporation network. Using VPN one can connect remote professionals to their offices networks connect remote offices together as LAN-to-LAN through the Internet or connect subnets inside organizations, buying tunnels of data that provide private communications on public networks sections. This dissertation to contribute with Secure and Low Cost Virtual Connection Under Linux topics, adopting a safety tool rolled as Free Software and defending the application and implementation of solutions for both LANs and WANs using these extensible resource. The experiments show data flowing inside encrypted tunnels carrying secret information. The main requirements are the authenticity, confidentiality and integrity in data transmissions between two departments exchanging sensible information through the internal network, over segments accessible to all staff. There are several softwares to capture of packages (Sniffers). Three of then were chosen to check the results, running in the Windows environment. The experiments could prove the safety improvement that VPN add to the IPv4 protocol, an IPv6 protocol native resource but of still restricted use. Through their tables and graphs, the dissertation hope provide a better understanding of the meaning and behavior of a data encrypted tunnel, as well as their internal components (private key, public key, authentication algorithm, encryption algorithm, etc).

ASSUNTO(S)

chave privada algoritmo de criptografia linux algorithm autentication ipv6 protocol rede de computador ipsec linux algoritmo de autenticação protocolo ipv6 public key ipv4 protocol segurança da informação vpn iso/iec 17799 chave pública protocolo ipv4 private key algorithm cryptography engenharias conectividade virtual segura redes de computadores

Documentos Relacionados