HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Protocols for tunneling and network security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Protocols for tunneling and network security  
> Access to the content HTML Beginning of the presentation  
> Description Quick overview of different protocols which can be used to build extranet VPNs: PPTP, L2F, L2TP and IPsec.  
> Context & Dates Talk made during an @jour seminar, Le VPN Extranet, organised by Internet Professionnel and 01 Réseaux, on 29 September 1999.
 
> Author Ghislaine Labouret  
> Type 19 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf

Introduction
Plan de la présentation

1. Qu'est-ce que la tunnelisation
Tunnels - Rôle
Tunnels - Principe de fonctionnement

2. Les tunnels de niveau liaison de données
Rappel sur PPP
PPTP (Point-to-Point Tunneling Protocol)
PPTP (2)
PPTP - Références
L2F (Layer 2 Forwarding)
L2TP (Layer 2 Tunneling Protocol)

4. La sécurité et les tunnels au niveau réseau avec IPsec
IPsec - Présentation
IPsec - Fonctionnalités fournies
IPsec - Composants et principe
IPsec - Les accès distants


Conclusion / Questions  

> Related documents
themeExchanges security
[Course]  TCP/IP Networks Security
[Course]  Networks and Communications Security
[Course]  Data Exchanges Security: IPsec, SSL, SSH
[Presentation]  Network encryption: IPsec, SSL, SSH [26 September 2000 - English]
[Presentation]  Network Encryption: IPsec, SSL, SSH [26 April 2000 - French/English]
[Presentation]  Network Security with Linux: SSL, IPsec, SSH [1 February 2000 - French]
[Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
themeVPN (Virtual Private Networks)
[Tool]  SSToPer tool [A Linux implementation for SSTP client - English]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  SSLtunnel for Windows [22 September 2004 - French]
[Presentation]  SSLTunnel : VPN for roadwarriors [4 February 2004 - French]
[Tool]  SSLTunnel tool [PPP VPN on SSL - English]
[Presentation]  IP VPN with IPsec tunnels [12 September 2001 - French]
[Presentation]  How to insert VPNs in existing security architectures? [29 September 1999 - French]
[Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
[Theme]  IPsec
> Copyright © 1999, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 22 April 2002 at 15:27:23 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants