Tuesday, December 29, 2009

Virtual Private Networking Tunnel

Virtual Private Networks (VPNs) provide secure and advanced connections through a non-secure network by providing data privacy. Private data is secure in a public environment. Remote access VPNs provides a common environment where many different sources such as intermediaries, clients and off-site employees can access information via web browsers or email. Many companies supply their own VPN connections via the Internet. Through their ISPs, remote users running VPN client software are assured private access in a publicly shared environment. By using analog, ISDN, DSL, cable technology, dial and mobile IP; VPNs are implemented over extensive shared infrastructures. Email, database and office applications use these secure remote VPN connections.

A few of the main components needed to create VPN connections are listed below:

* VPN services need to be enabled on the server.
* VPN client software has to be installed on the VPN client. A VPN client utilizes the Internet, tunneling and TCP/IP protocols to establish a connection to the network
* The server and client have to be on the same network.
* A Public Key Infrastructure (PKI)
* The server and client have to use the same:
o " Tunneling protocols
o " Authentication methods
o " Encryption methods.
* Centralized accounting

Remote access VPNs offer a number of advantages, including:

* Third parties oversee the dial up to the network.
* New users can be added with hardly any additional costs and with no extra expense to the infrastructure.
* Wan circuit and modem costs are eliminated.
* Remote access VPNs call to local ISP numbers. VPNs can be established from anywhere via the internet.
* Cable modems enable fast connectivity and are relatively cost efficient.
* Information is easily and speedily accessible to off-site users in public places via Internet availability and connectivity.

VPN Tunneling Overview
Tunneling is used to describe a method of using an internetwork infrastructure to transfer a payload. Tunneling is also known as the encapsulation and transmission of VPN data, or packets. IPSec tunnel mode enables IP payloads to be encrypted and encapsulated in an IP header so that it can be sent over the corporate IP internetwork or Internet.

IPSec protects, secures and authenticates data between IPSec peer devices by providing per packet data authentication. IPSec peers can be teams of hosts, or teams of security gateways. Data flows between IPSec peers are confidential and protected. The source and destination addresses are encrypted. The original IP datagram is left in tact. The original IP header is copied and moved to the left and becomes a new IP header. The IPSec header is inserted between these two headers. The original IP datagram can be authenticated and encrypted.

The tunnel is the logical path or connection that encapsulated packets travel through the transit internetwork. The tunneling protocol encrypts the original frame so that its content cannot be interpreted. The encapsulation of VPN data traffic is known as tunneling. The Transport Control Protocol/Internet Protocol (TCP/IP) protocol provides the underlying transport mechanism for VPN connectivity.

The two different types of tunneling are:

* Voluntary tunneling: With voluntary tunneling, the client starts the process of initiating a connection with the VPN server. One of the requirements of voluntary tunneling is an existing connection between the server and client. This is the connection that the VPN client utilizes to create a tunneled connection with the VPN server.
* Compulsory tunneling: With Compulsory tunneling, a connection is created between:
o Two VPN servers
o Two VPN access devices - VPN routers

In this case, the client dials-in to the remote access server, by using whichever of the following methods:
o Through the local LAN.
o Through an Internet connection.

The remote access server produces a tunnel, or VPN server to tunnel the data, thereby compelling the client to use a VPN tunnel to connect to the remote resources.

VPN tunnels can be created at the following layers of the Open Systems Interconnection (OSI) reference model:

* Data-Link Layer - layer 2: VPN protocols that operate this layer are Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP).
* Network Layer - layer 3: IPSec can operate as a VPN protocol at the Network layer of the OSI reference model.

Tunneling Protocols Overview and How to create a VPN tunnel

The tunneling protocols are responsible for the following functions:

* Tunnel maintenance: This involves both the creation and management of the tunnel.
* VPN data transfer: This relates to the actual sending of encapsulated VPN data through the tunnel.

The tunneling protocols provided by Windows Server 2003 are:

* Point-to-Point Tunneling Protocol (PPTP)
* Layer 2 Tunneling Protocol (L2TP)

Point-to-Point Tunneling Protocol (PPTP)

Point-to-Point Tunneling Protocol (PPTP), an extension of Point-to-Point Protocol (PPP), encapsulates PPP frames into IP datagrams to transmit data over an IP internetwork. Windows Server 2003 includes PPTP version 2. To create and manage the tunnel, PPTP utilizes a TCP connection. A modified version of Generic Route Encapsulation (GRE) deals with data transfer by encapsulating PPP frames for tunneled data. The encapsulated tunnel data can be encrypted and/or compressed. However, PPTP encryption can only be utilized when the authentication protocol is EAP-TLS or MS-CHAP. This is due to PPTP using MPPE to encrypt VPN data in a PPTP VPN, and MPPE needing EAP-TLS or MS-CHAP generated encryption keys. With the Windows Server 2003 implementation of PPTP, both 40-bit encryption and 128-bit encryption is supported.

The authentication methods supported by PPTP are the same authentication mechanisms supported by PPP:

* PAP
* CHAP
* MS-CHAP
* EAP

Layer 2 Tunneling Protocol (L2TP)

Layer 2 Tunneling Protocol (L2TP) is a combination of the benefits and features of PPTP and Cisco's Layer 2 Forwarding (L2F) protocol. L2TP encapsulates PPP frames, and sends encapsulated data over IP, frame relay, ATM and X.25 networks. With L2TP, the PPP and layer two end-points can exist on different devices. L2TP can also operate as a tunneling protocol over the Internet. L2TP uses UDP packets and a number of L2TP messages for tunnel maintenance. UDP is used to send L2TP encapsulated PPP frames as tunneled data.

While L2TP can provide encryption and compression for encapsulated PPP frames, you have to use Microsoft's implementation of L2TP with the IPSec security protocol. When L2TP is used with IPSec, the highest level of security is assured. This includes data confidentiality and integrity, data authentication, as well as replay protection. IPSec protects the packets of data and therefore provides security on insecure networks such as the Internet. This is due to IPSec securing the actual packets of data, and not the connection used to convey the data. IPSec utilizes encryption, digital signatures and hashing algorithms to secure data.

IPSec provides the following security features:

* Authentication; digital signatures are used to authenticate the sender.
* Data integrity; hash algorithms ensure that data has not been tampered with while in transit.
* Data privacy; encryption ensures that data cannot be interpreted while in transit.
* Replay protection; protects data by preventing unauthorized access by any attackers who resend data.
* The Diffie-Hellman key agreement algorithm is used to generate keys. This makes it possible for confidential key agreement to occur.
* Nonrepudiation; public key digital signatures authenticate the origin of the message.

The two IPSec protocols are:

* Authentication Header (AH); provides data authentication, data integrity and replay protection for data.
* Encapsulating Security Payload (ESP); provides data authentication, data confidentiality and integrity, and replay protection.

How to install Routing and Remote Access Service (RRAS)

1. Click Start, and then click Manage Your Server.
2. Select the Add or remove a role option.
3. The Configure Your Server Wizard starts.
4. On the Preliminary Steps page, click Next.
5. A message appears, informing you that the Configure Your Server Wizard is detecting network settings and server information.
6. When the Server Role page appears, select the Remote Access/VPN Server option and then click Next.
7. On the Summary of Selections page, click Next.
8. The Welcome to the Routing and Remote Access Server Setup Wizard page is displayed

How to install and enable a VPN Server

1. Click Start, Administrative Tools, and then click Routing And Remote Access to open the Routing And Remote Access management console.
2. In the console tree, select the server that you want to configure.
3. Right-click the server, and then click Configure And Enable Routing And Remote Access from the shortcut menu.
4. The Routing and Remote Access Server Setup Wizard starts.
5. Click Next on the Routing and Remote Access Server Setup Wizard Welcome page.
6. On the Common Configuration page, select the Remote Access (Dial-Up Or VPN) option. Click Next.
7. On the Remote Access page, select the VPN checkbox.
8. On the VPN Connection page, choose the interface which is connected to the Internet and click Next.
9. On the IP Address Assignment page, select the Automatically option if you want use a DHCP server for IP address assignment for remote clients; or select the From A Specified Range Of Addresses option if you want to specify your own address range.
10. If you chose the From A Specified Range Of Addresses option, proceed to specify the address range for remote clients. Click Next.
11. On the Managing Multiple Remote Access Servers page, select the No, Use Routing And Remote Access To Authenticate Connection Requests option. Click Next.
12. Click Finish when the Completing the Routing and Remote Access Server Setup Wizard page appears.

How to create a VPN tunnel and How to configure PPTP ports or L2TP ports

1. Click Start, Administrative Tools, and then click Routing And Remote Access to open the Routing And Remote Access management console.
2. In the console tree, expand the node for the server that you want to configure.
3. Right-click Ports and then select Properties from the shortcut menu to open the Ports Properties dialog box.
4. Select WAN Miniport (PPTP) or select WAN Miniport (L2TP).
5. Click the Configure button.
6. The Configure Device dialog box opens.
7. In the Maximum Ports box, specify the number of connections that the port type which you have selected can support. The default configuration setting when the RRAS is installed is 5 PPTP ports and 5 L2TP ports.
8. If you want to specify the IP address of the public interface to which VPN clients connect, use the Phone Number For This Device box on the Configure Device dialog box.
9. If you want to disable connections for the port type, deselect the Use the Remote Access Connections (Inbound Only) checkbox on the Configure Device dialog box.
10. If you do not want to allow the specific VPN type to be used for demand-dial connections, deselect the Demand-Dial Routing Connections (Inbound And Outbound) checkbox.
11. Click OK to close the Configure Device dialog box.
12. Click OK to close the Ports Properties dialog box

How to configure a VPN client

1. On the client computer open Control Panel.
2. Right-click Network Connections and then select Open from the shortcut menu.
3. Click New Connection Wizard to start the New Connection Wizard.
4. Click Next on the Welcome to the New Connection Wizard page.
5. On the Network Connection Type page, select Connect to the network at my workplace, and then click Next.
6. Click Virtual Private Network Connection, and click Next.
7. Enter a name for the connection and click Next.
8. Specify the external IP address of the VPN server, or the FQDN of the VPN server, and then click Next.
9. Select the Anyone's use - If you want the connection to be available to everyone who uses the computer and then click Next.
10. When the Completing the New Connection Wizard page appears, click Finish.
11. The logon dialog box is displayed after you click the Finish button to complete the New Connection Wizard.
and for a good tips you must read this Tips on reducing your insurance costs
Read more...

Monday, November 16, 2009

The Best Sexy Clothes from flirtylingerie.com

Flirty Lingerie provides its products and services to you, the customer or potential customer subject to the following terms and conditions. If you visit or make a purchase at Flirty Lingerie, you accept these conditions. Your use of this site is governed by the policies, terms and conditions set forth below. Please read these terms and conditions carefully. Your use of this site indicates your acceptance of these terms and conditions. Your placement of an order indicates the acceptance of these terms and conditions. Your submission of any purchase order to Flirty Lingerie indicates acceptance of these terms and conditions. These terms and conditions shall supersede any subsequent terms and/or conditions included with any purchase/s whether or not any such terms or conditions are signed by Flirty Lingerie or the purchaser. Flirty Lingerie reserves the right to make changes to this site, its terms and conditions, or any other provisions, conditions, acceptances or modifications of this website, located at http://www.flirtylingerie.com. and the records of FlirtyLingerie.com maintained at the corporate offices located at 5244 Second Street N.W. Albuquerque, New Mexico 87107 at any time deemed necessary by the management or owners of this site.
If you're looking for Bridal Lingerie, you will find it site below, along with a huge selection of Bra and Panties, Bridal Lingerie, Bustiers & Corsets, Camisoles, Chemises, Garter Belts & Wigs, Long Gowns, Dancewear, sexy lingerie collection and so much more, Flirty Lingerie is an online web site and retail store located in Albuquerque, New Mexico. Check here for information concerning our site and store.
Flirty Lingerie offers over 7,500 items on its website, and a varied selection of items in its retail location. The retail location under went an expansion in the fall of 2007, doubling the size of its warehouse and retail operation, Flirty Lingerie is a full service lingerie, sexy clothing, shoes, leather and sex toy web site. Flirty Lingerie has been online since 1999, and has operated a retail store in Albuquerque, New Mexico since 2004.

Read more...

Wednesday, October 14, 2009

onlinecasinoreports.ca

The problem is how we know a good online Casinos that have been known by many people familiar with the game and a gift so large and very profitable, we need a special kind of search engine online Casinos on the pub review the online casino that tells us the advantages of online site casino.
After I search the internet directed me to address http://www.gamblingpub.com after that I see is gamblingpub.com groups online Casinos best gamblingpub.com review of online Casino in the world and sites online Casinos listed in gamblingpub.com is the best online Casinos.
With gamblingpub.com I can choose the online casino that has a variety of slot games online casino and when we mean we have canada online gambling, I feel that the very gamblingpub.com with the site because I can choose the best online casino.
If you are having difficulties looking for sites online casino you can go to online casinos to find the best onlin casinos, playing online casino is very fun when we are lucky we will win the game, and when we won many prizes casino games we will get, online Casinos is now spread all over the world, we can find a lot of variety on the internet online casino from various game and also the gift of online casino games.
Read more...

 
© free template by pojok.teknologi@gmail.com