izpis_h1_title_alt

Varna povezava oddaljenih lokacij podjetja z izvedbo navideznega zasebnega omrežja
ID KUHELJ, MATEVŽ (Author), ID Kos, Anton (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,70 MB)
MD5: 6E06650CE1B75481EA8BB5ED10B05002
PID: 20.500.12556/rul/a9c1872b-9e56-4191-bdde-be8350371fb0

Abstract
Diplomska naloga zajema, opisuje in preučuje splošne značilnosti na področju navideznih zasebnih omrežij (ang. Virtual Private Networks) oziroma tako imenovanih povezav VPN. Te so danes predvsem v poslovnem svetu nepogrešljivi člen verige informacijsko-komunikacijskih storitev. Pogled na VPN je predstavljen z vidika uporabnosti in namena takšnih povezav ter protokolov, ki te povezave omogočajo. Pogledali smo splošne značilnosti in namen navideznih zasebnih omrežij, osnovanih na trenutno poznanih protokolih, ter zajeli njihovo bistvo, ki se vrti okrog varnosti in varne izmenjave podatkov preko »ne varnega« interneta. Pri pregledu trenutno obstoječih protokolov in algoritmov smo poiskali razlike med enimi in drugimi, nato pa na podlagi teh določili, kateri so boljši in kateri slabši ter kateri bolj ustrezajo naši praktični nalogi. Končni izdelek je laboratorijska postavitev povezave VPN, ki tudi najbolje povzema in predstavi uporabo v teoretičnem delu opisanih protokolov in algoritmov.

Language:Slovenian
Keywords:VPN, varnost, protokoli, algoritmi, Juniper
Work type:Bachelor thesis/paper
Organization:FE - Faculty of Electrical Engineering
Year:2016
PID:20.500.12556/RUL-87167 This link opens in a new window
Publication date in RUL:28.11.2016
Views:3303
Downloads:445
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Secure connection of remote corporate locations over a virtual private network
Abstract:
This thesis covers, describes and examines general features of virtual private networks e.g. VPNs. As it is well known today virtual private networks and belonging connections are and indispensable part of informations communications technologies especially in the business world. We are going to take a look on this topic in terms of usability and purposes of such connections and in terms of protocols which ensure this type of connectivity. Further, we are going to take a look at the protocols and algorythms currently used for establishing VPNs as the essence of the provision of secure connectivity and save data exchange over unsecure Internet. We will bi interested primarly in differences and similarities that separate one protocol/algorythm from another and, based on knowing the theory behind them, try to determine which are the most suitable for use in making practical part of thesis. Final product will be a laboratory layout VPN which will present previously described protocols and algorythms in actual use.

Keywords:VPN, security, protocols, algorythms, Juniper

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back