Abstract
The aim of this article is to present drawbacks of the most popular version/ application of virtual private network service based on Internet Protocol Security (IPsec) as well as to describe the most interesting alternatives used to develop modern business services. Firstly, the article presents history of virtual private network (VPN) and focuses particularly on Secure VPN, where data are encrypted. Secondly, it discusses various aspects of using IPsec VPN while requirements of enterprises are constantly rising. Thirdly, it indicates examples of DMVPN (Dynamic Multipoint VPN) and GETVPN (Group Encrypted Transport VPN) used for implementing private services in hub-and-spoke and full-mesh architecture. DMVPN is generally recommended for usage over public networks, where it creates a VPN and secures it. DMVPN is a very good security improvement for MPLS VPN. GETVPN is favorable to secure existing VPN over private networks. Contrary to DMVPN, it uses distinct polices and multiple overlays, which give limited interoperability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Laskowski, D., Łubkowski, P.: Confidential Transportation of Data on the Technical State of Facilities. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the Ninth International Conference on DepCoS-RELCOMEX. AISC, vol. 286, pp. 313–324. Springer, Heidelberg (2014)
Łubkowski, P., Laskowski, D.: Test of the Multimedia Services Implementation in Information and Communication Networks. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the Ninth International Conference on DepCoS-RELCOMEX. AISC, vol. 286, pp. 325–332. Springer, Heidelberg (2014)
Jankuniene, R., Jankunaite, I.: Route Creation Influence on DMVPN QoS. In: 31st International Conference on Information Technology Interfaces, pp. 609–614. SRCE Univ. Computing Centre, Croatia (2009)
Malinowski, T., Arciuch, A.: The procedure for monitoring and maintaining a network of distributed resources. In: Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 947–954. IEEE (2014)
Cisco Systems, Inc.: Dynamic Multipoint VPN (DMVPN) Design Guide (2006)
Cisco Systems, Inc.: Group Encrypted Transport VPN (GETVPN) Design and Implementation Guide (2012)
Conlan, P.J.: Cisco Network Professional’s Advanced Interworking Guide (2009)
Nowosielski, L., Łopatka, J.: Measurement of Shielding Effectiveness with the Method Using High Power Electromagnetic Pulse Generator. In: Progress In Electromagnetics Research Symposium, PIERS 2014 Conference Proccedings, China, pp. 2687–2691 (2014)
Sławińska, M., Butlewski, M.: Efficient Control Tool of Work System Resources in the Macro-Ergonomic Context. In: Applied Human Factors and Ergonomics, AHFE Conference, pp. 3780–3788 (2014)
Konieczny, Ł., Burdzik, R., Figlus, T.: Possibility to control and adjust the suspensions of vehicles. In: Mikulski, J. (ed.) TST 2013. CCIS, vol. 395, pp. 378–383. Springer, Heidelberg (2013)
Krzykowska, K., Siergiejczyk, M.: The impact of new technologies on the safety level of air traffic. In: Proceedings of the European Safety and Reliability Conference, Safety and Reliability: Methodology and Applications, p. 18. CRC Press/Balkema (2015)
Nowakowski, T., Werbińska-Wojciechowska, S.: Data gathering problem in decision support system for means of transport maintenance processes performance development, pp. 899–907. CRC Press/Balkema, Amsterdam, The Netherlands (2014)
Jasiulewicz-Kaczmarek, M.: Sustainability: Orientation in Maintenance Management -Theoretical Background. In: Golinska, P., et al. (eds.) Eco-Production and Logistics. Emerging Trends and Business Practices, pp. 117–134. Springer
Siergiejczyk, M., Krzykowska, K., Rosiński, A.: Parameters analysis of satellite support system in air navigation. In: Selvaraj, H., Zydek, D., Chmaj, G. (eds.) Proceedings of the Twenty-Third International Conference on Systems Engineering. AISC, vol. 330, pp. 673–678. Springer, Heidelberg (2015)
Jin, W., et al.: Scalable and Reconfigurable All-Optical VPN for OFDM-Based Metro-Access Integrated Network. Journal of Lightwave Technology 32, 318–325 (2014)
Simion, D., et al.: Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. International Journal of Computers Communications & Control 8, 136–145 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pólkowski, M., Laskowski, D., Łubkowski, P. (2015). Application of Data Encryption for Building Modern Virtual Private Networks. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Complex Systems and Dependability. DepCoS-RELCOMEX 2015. Advances in Intelligent Systems and Computing, vol 365. Springer, Cham. https://doi.org/10.1007/978-3-319-19216-1_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-19216-1_38
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19215-4
Online ISBN: 978-3-319-19216-1
eBook Packages: EngineeringEngineering (R0)