VPN and NAP Discussion Replies computer science homework help
Please help me write 3 sentences in response to the each question: 3 sentences for each question
1.)
Network Access Protection (NAP) is a technology that was introduced in Windows Vista and Windows Server 2008. NAP includes client and server components that allow you to create and enforce health requirement policies that define the required software and system configurations for computers that connect to a network. NAP enforces health requirements by inspecting and assessing the health of client computers, limiting network access when client computers are noncompliant, and remediating noncompliant computers for unlimited network access. NAP enforces health requirements on client computers that are attempting to connect to a network as well as also providing ongoing health compliance enforcement to network connected compliant client computers.
NAP enforcement occurs when client computers attempt to access the network through network access servers, such as a VPN server running, or when clients attempt to communicate with other network resources. The way in which NAP is enforced depends on the enforcement method you choose. NAP enforces health requirements on IPsec protected communications, 802.1X authenticated connections, VPN connections, and DHCP configuration.
2.)
The advantage of using a VPN in an organization is it provides a secure network infrastructure. Some benefits of VPN includes cost savings and network scalability. VPN is especially useful for organization that has multiple branches and employee mobility. It can save an organization money by eliminating the need for additional long distance leased lines and dedicated private network. VPN provides scalability by using public lines and creating a “tunnel†that allows users to securely access files and resources as if they were in the organizations local network, even if they are at home, traveling, or at a different branch site.
There are different types of VPN technologies. The most commonly used are PPTP, L2TP, IPSec, and SSL.
PPTP (Point-to-Point Tunneling Protocol) – This protocol is faster than the other protocols, but does not provide encryption. It is usually combined with other security protocol like PPP (Point-to-Point Protocol) to provide security measures.
L2TP (Layer 2 Tunneling Protocol) – Like PPTP, it does not provide encryption, and is usually combined with another VPN security protocol like IPSsec to encrypt the data and handles secure communication between the tunnel. The advantage of using L2TP is not only does it provide data confidentiality but also provides data integrity.
IPsec – provides authenticating and encrypting protocol for each IP packet of a data stream. However, it requires expensive, time consuming client installation.
SSL (Secure Socket Layer) – is a VPN accessible via HTTPS over web browser. It doesn’t need any software installed. The disadvantage of SSL is it can be restricted to specific application instead of allowing entire access to the entire network.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

