18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Internet Security 309<br />

Virtual private networks enable enterprises <strong>to</strong> leverage the Internet,<br />

while protecting sensitive business information. With VPNs, companies<br />

can achieve a significant cost saving of up <strong>to</strong> 60% over private leased<br />

lines and 30% over frame-relay networks.<br />

VPNs have <strong>to</strong> provide scalability, flexibility and reliable performance<br />

in order that the companies use them <strong>to</strong> support access <strong>to</strong> their missioncritical<br />

applications. All the components of VPNs should be easy <strong>to</strong><br />

configure and provide seamless integration within the whole enterprise<br />

security infrastructure.<br />

VPNs have <strong>to</strong> provide the following three critical functions <strong>to</strong><br />

ensure security for data:<br />

• Authenticate — confirm that the data is coming from the source that<br />

it claims;<br />

• Secure — restrict read/write access and maintain data integrity of the<br />

data traveling over the Internet; and<br />

• Access control — allow only authorized users <strong>to</strong> gain admission <strong>to</strong><br />

the network<br />

VPN uses the following technologies:<br />

• Encryption;<br />

• Authentication; and<br />

• Pro<strong>to</strong>col Tunneling — In pro<strong>to</strong>col tunneling, the actual data packets<br />

are encrypted; then enclosed inside other IP packets and transmitted<br />

across the Internet. At the destination, there is a special host that<br />

decrypts them. This tunneling of data is completely transparent <strong>to</strong> the<br />

end-users. They feel as if they are directly connected <strong>to</strong> the internal<br />

LAN.<br />

Various pro<strong>to</strong>cols are used <strong>to</strong> carry out tunneling, such as Microsoft's<br />

Point-<strong>to</strong>-Point Tunneling Pro<strong>to</strong>col (PPTP), Ipsec pro<strong>to</strong>col and L2TP<br />

pro<strong>to</strong>col proposed by Cisco and Microsoft. There are several vendor<br />

products available for creating and managing VPNs, such as IBM<br />

eNetwork VPN series and AltaVista Tunnel97. Many telecom carriers<br />

such as AOL and AT&T also offer dedicated services for VPN<br />

communication.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!