Using Internet Protocol Security to Create Tunnels to Communicate Securely on a Network
Loading...
Authors
DonVito, Jenna D.
Burns, Zachary J.
Issue Date
2015-04-10
Type
oral_presentation
Language
en_US
Keywords
Encryption , Tunnels , IPSEC , Communication , Network , Secure
Alternative Title
Abstract
We are implementing IPSEC in a new way. We want to be able to communicate through tunnels which are created on a common network. This will benefit many companies, corporations, and businesses because they will be able to securely communicate data from their business without anyone outside the network spying or eavesdropping on their data. By using IPSEC, the packets being sent across the network are encrypted. In order to create secure tunnels, you must run a program to enter any IP addresses you would like to create tunnels with. You must then use a secure proxy server to connect to the internet outside the tunnels. Using these tunnels, users will be much more comfortable with sharing their data over the network because they have the power to control their privacy themselves through the tunnels rather than relying on someone else outside.