Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/9532
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kodgyale, Priya | - |
dc.date.accessioned | 2021-01-05T05:36:01Z | - |
dc.date.available | 2021-01-05T05:36:01Z | - |
dc.date.issued | 2020-06-01 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/9532 | - |
dc.description.abstract | Considering the consistent networks expansion in exponential manner, network security became key requirements of today’s generation. Network Security probing for VPN (Virtual Private Network) provides proactive analysis of user VPN connectivity problems, which may cause in future. As most of the organization’s employee needs to work outside the organizations network environment , user needs to be provided a secure tunnel from outside network to inside organization network. Due to any reason like certificate issue or improper software updating, user may lose the VPN connectivity or it may cause impact on organization as per critical role of user and may lead to big problem or loss. To avoid these kind of futures unconvinced problems, this solution providing a Dashboard with continuous logs monitoring and filtered information to reduce incidence handling efforts and less impact on future work due to VPN connectivity loss. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 18MCEI03; | - |
dc.subject | Computer 2018 | en_US |
dc.subject | Project Report 2018 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 18MCEI | en_US |
dc.subject | 18MCEI03 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2018 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Network Security Probing For VPN | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
18MCEI03.pdf | 18MCEI03 | 777.06 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.