FacebookMySpaceTwitterDiggDeliciousStumbleuponGoogle BookmarksRedditNewsvineTechnoratiLinkedinMixxRSS FeedPinterest

Improving Network Security with a Virtual Network

A virtual network uses virtual links to connect computers rather than physical connections. A virtual link is a combination of hardware and software that provides the functionality of a network. A virtual network is a single administrative entity that may also use virtualized resources and platforms. Businesses often use virtualization to improve network security.

Deployment

RAD Data Communications states that virtual networks may be based on virtual protocols or devices. Networks based on virtual protocols include Virtual Local Area Networks, Virtual Private LAN Services and Virtual Private Networks. An organization can deploy a VLAN by using a VLAN ID to partition a physical LAN into logical LANs. It's also possible to combine physical LANs into a logical LAN. A single router may connect the computers on a partitioned network, or each VLAN may use its own router.

Organizations often deploy a VLAN onto a VPN, which consists of multiple endpoints connected by a tunnel through a physical network. A VPN's endpoints typically consist of VPN gateways to software clients, and a third party usually administers the physical network. Two endpoints in a VPN comprise a Point-to-Point VPN. An organization can also deploy a multipoint VPN by creating multiple tunnels.

A VPLS is a type of multipoint VPN that can be classified into Ethernet Virtual Connection Services and Transparent LAN Services. An EVCS has a VLAN ID that provides it with sub-netting capability, while a TLS does not have this capability.

Networks based on virtual devices include networks that use a hypervisor to connect virtual machines. A virtual machine is a software application that emulates the characteristics of a physical machine. A hypervisor is a program that creates and manages the virtual machines, which typically run on a single physical machine. This type of network has virtualized network components such as virtual firewalls, routers and switches. It may use virtual protocols such as IEEE 802.1Q, or it may use physical protocols such as Ethernet.

Security

Organizations often use a VPN when they need a secure virtual network. A VPN allows computers to send and receive secure data over a public network like the Internet as if they were on a physical private network. This solution has the connectivity of a public network while providing the functionality, management and security of a private network. A VPN accomplishes this by creating a virtual PTP connection between the two computers. This connection use encryption, dedicated connections or both.

A common use of a VPN is to communicate between an organization's main office and its satellite offices by using the Internet. Kent Information Services reports that this implementation of a virtual network is especially beneficial to medium-sized business. It eliminates the expense of a dedicated data line to provide the required security, which this example accomplishes with tunneling protocols and authenticated remote access.

The VPN Consortium reports that the VPN security model prevents attackers from seeing plain-text data, even when they sniff the network traffic at the packet level. Authentication of the sender prevents an unauthorized user from gaining access to the VPN, and message integrity can detect when an attacker modifies a transmitted message. A VPN must authenticate the endpoints of a tunnel before it can establish a connection between computers. VPNs that allow remote access may use additional methods to authenticate users such as biometrics, two-factor authentication and passwords.

VPNs use a variety of protocols to maintain security, such as Internet Protocol Security. The Internet Engineering Task Force originally developed IPsec for IPv6, although it's primarily used in the Layer 2 Tunneling Protocol and IPv4. IPsec encrypts an IP packet within an IPsec packet, sends it through the tunnel and decrypts the IP packet at the end of the tunnel. Secure Socket Layer/Transport Layer Security can send the traffic for an entire network through a tunnel, and it can also establish a secure connection for an individual session.

Author Bio

Matt Smith is a Dell employee who writes to help raise awareness on the topic of Virtualization and other network management subjects.

 

Comments   

 
Rugby Live Free
0 #18 Rugby Live Free 2017-06-08 12:57
I am actually pleased to read this web site posts which carries tons of valuable data, thanks for providing these
kinds of data.
Quote | Report to administrator
 
 
החלפת מנעולים קריות
0 #17 החלפת מנעולים קריות 2016-08-14 16:31
If you desire to increase your knowledge simply keep visiting this web page and be updated with the
most recent information posted here.

Also visit my site - החלפת מנעולים קריות: https://www.youtube.com/watch?v=LzeL4k0Lcps
Quote | Report to administrator
 
 
limousine rental
0 #16 limousine rental 2016-08-11 18:23
It's not my first time to go to see this website, i am browsing this website dailly and take fastidious information from
here every day.

my web-site; limousine rental: http://poteskeet.org/forum/profile.php?id=18056
Quote | Report to administrator
 
 
cancun real estate
0 #15 cancun real estate 2016-03-23 07:17
Hello, i think that i saw you visited mmy blog thus i came to “return the favor”.I am attempting to find things to enhance my site!I suppose its ok too use some
of your ideas!!
Quote | Report to administrator
 
 
Aurelia
0 #14 Aurelia 2016-03-14 13:57
Think of it like this, if English is the lingua franca
of the world and almost everyone understands English, why
not have a universal currency where we can pay easily without the hassle of converting
to different denomination. It is much more like Paypal that only uses gold
as its medium. This is where you are going to love Zygor, once you start mining and
gaining higher experience you will be able to mine better precious stones.


Feel free to surf to my weblog Aurelia: http://www.locol.ru/component/k2/itemlist/user/684356
Quote | Report to administrator
 
 
bigdatalowcost.com
0 #13 bigdatalowcost.com 2016-03-09 02:01
Understanding the capabilities a list supplier has beyond the e-mail list itself will enable you to establish
the fitting fit for you.

My web site: how to get email database Poland; bigdatalowcost. com: http://bigdatalowcost.com/databases/best-united-kingdom-email-business-database/,
Quote | Report to administrator
 
 
Maple
0 #12 Maple 2015-12-27 01:27
Deloitte ha calculado que a lo largo del dos mil catorce se realizaron más
de 100 millones de consultas médicas en línea a nivel global.
Quote | Report to administrator
 
 
hosting wordpress
0 #11 hosting wordpress 2015-12-10 05:46
What's up, this weekend is fastidious in favor of me, as this occasion i
am reading this enormous informative article here at my residence.
Quote | Report to administrator
 
 
Custom Backyard
0 #10 Custom Backyard 2015-12-04 05:18
Good day! I know this is somewhat off topic but I was wondering which blog platform
are you using for this site? I'm getting fed up of
Wordpress because I've had issues with hackers and I'm looking at alternatives for another platform.
I would be great if you could point me in the direction of a good platform.
Quote | Report to administrator
 
 
סורגים בראשון לציון
0 #9 סורגים בראשון לציון 2015-12-02 11:06
John Wild is vice president of Absolute Access & Security.
• Don’t forget to check its compatibility with your building structure and
the ability of the system to deliver a good sound quality which depends on the structure of your home.
Make sure you clean your face thoroughly before moisturizing.



My page; סורגים
בראשון לציון: http://mustardseedassemblies.org/?option=com_k2&view=itemlist&task=user&id=628474
Quote | Report to administrator
 

Add comment


Security code
Refresh

English French German Italian Portuguese Russian Spanish

Popular Content

Partners