master's thesis
Comparative analyses of VPN tunelling protocols

Perica Pejić (2014)
Metadata
TitleKomparativna analiza VPN protokola tuneliranja
AuthorPerica Pejić
Mentor(s)Drago Žagar (thesis advisor)
Abstract
U radu je glavni zadatak bio analizirati VPN protokole tuneliranja, te na primjeru opisati proces implementacije različitih protokola tuneliranja. Objašnjene su virtualne privatne mreže, različiti protokoli tuneliranja koji se koriste za uspostavljanje virtualnih privatnih mreža, te je opisan postupak postavljanja VPN poslužitelja i VPN klijenta za korištenje različitih protokola tuneliranja. Za prikaz procesa uspostavljanja virtualne privatne mreže je odabran karakterističan scenarij VPN udaljenog pristupa. Pritom su za kao VPN klijent i VPN poslužitelj korištena računala s Windows operativnim sustavima, koji imaju ugrađeno VPN rješenje koje omogućuje korištenje nekoliko različitih protokola tuneliranja
Keywordsvirtual private network PPTP L2TP IPSec SSTP remote access
Parallel title (English)Comparative analyses of VPN tunelling protocols
Committee MembersDrago Žagar (committee chairperson)
Krešimir Grgić (committee member)
Višnja Križanović Čik (committee member)
GranterSveučilište Josipa Jurja Strossmayera u Osijeku
Fakultet elektrotehnike, računarstva i informacijskih tehnologija Osijek
Lower level organizational unitsZavod za komunikacije
Katedra za radiokomunikacije i telekomunikacije
PlaceOsijek
StateCroatia
Scientific field, discipline, subdisciplineTECHNICAL SCIENCES
Computing
Information Systems
Study programme typeuniversity
Study levelgraduate
Study programmeGraduate University Study Programme in Electrical Engineering; branch: Communications and Informatics, Power Engineering
Study specializationbranch: Communications and Informatics
Academic title abbreviationmag.ing.el.
Genremaster's thesis
Language Croatian
Defense date2014-10-06
Parallel abstract (English)
The paper's main task was to analyze the VPN tunneling protocols, and describe on example the process of implementation of the various tunneling protocols. Paper explains virtual private network, different tunneling protocols used to establish virtual private networks, and describes the procedure for setting up a VPN server and VPN client to use different tunneling protocols. For describing the process of establishing a virtual private network typical remote access scenario VPN is selected. For VPN client and the VPN server computers with Windows operating systems are used, which have built-in VPN solution that makes use of several different tunneling protocols
Parallel keywords (Croatian)virtualne privatne mreže PPTP L2TP IPsec SSTP udaljeni pristup.
Resource typetext
Access conditionOpen access
Terms of usehttp://rightsstatements.org/vocab/InC/1.0/
URN:NBNhttps://urn.nsk.hr/urn:nbn:hr:200:958273
CommitterAnka Ovničević