Question about vpn communications

Assignment Help Operating System
Reference no: EM1379558

Question1- Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network. Now, Virtual Private Networks encrypt all traffic and make it impossible to inspect what's coming and going. What can we do to assure that legitimate traffic flows and that malicious traffic is stopped? How can you configure the network to manage VPN and non-VPN traffic?

Question2- This is the post from other student, I need you response if you agree or disagree and why, give me your own opinion. This post is the opinion from the student from the question #1
Configuring the network to manage the VPN aand non-VPN traffic is straight forward. A VPN system consists of a VPN server located with the corporate infrastructure. The VPN server generally is the router or the firewall directly connected to the public network (Internet). This firewall or Router authenticates users when they connect and if they are allowed access, the server will provide mapping to the users so they have access to the internal network as if they were in the office. The authentication processes is the crucial part of identifying users by checking what they are allowed to do. Actually the remote user is required to have a client application capable of communicating with the VPN server and this application will send all data to the VPN server using encryption. In fact the idea of encryption is to secure the connection between the VPN server and the remote user application rather than allowing the remote user to hide activities from the server. At the corporate level even though the VPN user's connection is encrypted they can still have idea of what exactly the remote user accessed when connected to the system. When VPN traffic is generated, it's usually from legitimate source so there is no need to try to monitor traffic flow and stop malicious traffic. The non-VPN traffic can be managed by allowing users only access within the Intranet without going over the perimeter of the router or the firewall. Access to the Internet by users is always monitored by the firewall (especially the incoming traffic). Therefore whatever malicious traffic that will flow between a non-VPN traffic and the firewall will be stopped.

Question3- This other post from the student from the question #1, Please response if you agree or disagree and why, please explain your opinion about it.

I also want to add that the VPN communications as the name said is private. This means that the communications must remain private between the server and the client. If for whatever reason a server, router or firewall is allowed to monitor or record this communication the privacy side of the communication is gone. For that reason I don't think there will be soon a tool to monitor the communication in the VPN concept. I might be wrong, but this is my understanding. What do you think guys?

 

Reference no: EM1379558

Questions Cloud

Explaining the type of firewall : Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?
Stateful inspection packet filtering routers : Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network
Solving passwords problems : As we all know about problems with people and passwords and how technology can mitigate some of them. What types of problems do you assume implementing these technologies for people might cause?
Creating hipo charts and decision tables : Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,
Question about vpn communications : Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network.
Catching exception : Create a program that shows how various exceptions are caught with catch Exception
Effects of spyware and adware : Describe the effects of spyware and adware. Discuss how has spyware and adware impacted the public's confidence in the security of internet?
Compute the bandwidth requirements for a live event : Compute the bandwidth requirements for a live event that is streamed over the Internet based on the information given below.
Pros and cons of using embedded uid and pw : Think about an embedded user id and password which provides me access to a client/server environment. Discuss the pros and cons of using an embedded uid and pw?

Reviews

Write a Review

Operating System Questions & Answers

  Power management settings in bios

Every day at 2PM a client's computer at work reboots itself. You have made sure the power management settings in the BIOS and in the Windows Control Panel are not responsible.

  Determine major computer components

Suppose you have decided to buy a personal computer system for personal use and wish to be able to do the following tasks on the computer,

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

  Disk scheduling algorithms

Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.

  Validating the option code field during data entry

The systems reviewer are constructing the test plans for the user interface for the Holloway Travel Vehicles system.

  How many page faults would occur under pure demand paging

How many page faults would occur under pure demand paging (all frames are initially empty), assuming four frames are available, under FIFO, LRU.

  Potential security threats to managing information

Suppose that you have been asked to consult for a corporation that has branch offices in four continents. You have implemented a management data system that will enable its managers to exchange information.

  What would you do to influence procurement process-platform

What would you do to influence the procurement process for both platforms (hardware & OS, such as desktops, laptops, servers, etc.) and application software?

  Organization institutionalizes policies

The answer gives the learner with an understanding of management's role in the development and enforcement of data security policies, standards, practices, precess and guidelines.

  Explain the concepts of consumable and reusable resources

Explain the concepts of consumable and reusable resources

  Explaining first-in-first-out scheduling

Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd