Knihovna
Slovník
O projektu
Soutěž + kombinovaná mobilita
Kontakt
CS
EN
SK
ES
DE
ON-LINE –
Network security
Securing networks by using VPNs
Explanatory Notes
1 Virtual Private Network - definition of basic concepts
2 VPN Components
3 VPN Classification according to RM-OSI
4 IPSec protocol - description
5 IPSec key exchange - ISAKMP/IKE method
6 Diffie-Hellmann Algorithm
7 Attacks on Local Networks - Examples and Solutions
8 Building VPN with IPSec - Examples and Solutions
8.1 Example of an IPSec VPN Configuration on Cisco Devices
9 Building VPN with SSL/TLS - Examples and Solutions
9.1 Types of SSL VPN access
10 Electronic Signature
10.1 Guaranteed electronic signature
10.2 Qualified electronic signature
10.3 Electronic Seal
10.4 Time stamp
Securing networks by using VPNs
Explanatory Notes
1 Virtual Private Network - definition of basic concepts
2 VPN Components
3 VPN Classification according to RM-OSI
4 IPSec protocol - description
5 IPSec key exchange - ISAKMP/IKE method
6 Diffie-Hellmann Algorithm
7 Attacks on Local Networks - Examples and Solutions
8 Building VPN with IPSec - Examples and Solutions
8.1 Example of an IPSec VPN Configuration on Cisco Devices
9 Building VPN with SSL/TLS - Examples and Solutions
9.1 Types of SSL VPN access
10 Electronic Signature
10.1 Guaranteed electronic signature
10.2 Qualified electronic signature
10.3 Electronic Seal
10.4 Time stamp