Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.

Esta monografía presenta el desarrollo e implementación práctica de un laboratorio GET VPN, para el uso del personal del NOC corporativo de la compañía CLARO COLOMBIA S.A., haciendo uso de guías, manuales, parámetros y procedimientos de configuración relacionados, dentro de la operación del NOC. Gro...

Full description

Autores:
Sánchez Escobar, José Fernando
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2015
Institución:
Universidad Santo Tomás
Repositorio:
Repositorio Institucional USTA
Idioma:
spa
OAI Identifier:
oai:repository.usta.edu.co:11634/2788
Acceso en línea:
https://hdl.handle.net/11634/2788
Palabra clave:
Group Member
Key Server
Troubleshooting
Ingeniería de Telecomunicaciones
Comunicación
Investigación
Cifrado
Conectividad
Rights
openAccess
License
Atribución-NoComercial-SinDerivadas 2.5 Colombia
id SANTOTOMAS_4264f466cd8f09cc11d52cd09d349802
oai_identifier_str oai:repository.usta.edu.co:11634/2788
network_acronym_str SANTOTOMAS
network_name_str Repositorio Institucional USTA
repository_id_str
dc.title.none.fl_str_mv Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
title Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
spellingShingle Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
Group Member
Key Server
Troubleshooting
Ingeniería de Telecomunicaciones
Comunicación
Investigación
Cifrado
Conectividad
title_short Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
title_full Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
title_fullStr Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
title_full_unstemmed Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
title_sort Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
dc.creator.fl_str_mv Sánchez Escobar, José Fernando
dc.contributor.advisor.none.fl_str_mv Díaz Pardo, Iván Eduardo
dc.contributor.author.none.fl_str_mv Sánchez Escobar, José Fernando
dc.contributor.googlescholar.none.fl_str_mv https://scholar.google.com/citations?hl=es&user=s301RbcAAAAJ
dc.contributor.cvlac.none.fl_str_mv https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000688860
dc.contributor.corporatename.none.fl_str_mv Universidad Santo Tomás
dc.subject.keyword.spa.fl_str_mv Group Member
Key Server
Troubleshooting
topic Group Member
Key Server
Troubleshooting
Ingeniería de Telecomunicaciones
Comunicación
Investigación
Cifrado
Conectividad
dc.subject.lemb.none.fl_str_mv Ingeniería de Telecomunicaciones
Comunicación
Investigación
dc.subject.proposal.spa.fl_str_mv Cifrado
Conectividad
description Esta monografía presenta el desarrollo e implementación práctica de un laboratorio GET VPN, para el uso del personal del NOC corporativo de la compañía CLARO COLOMBIA S.A., haciendo uso de guías, manuales, parámetros y procedimientos de configuración relacionados, dentro de la operación del NOC. Group Encrypted Transport, (GET VPN), permite cifrar tráfico generado entre dispositivos como switches y routers. Es posible crear diferentes grupos de estos dispositivos, con el fin de proteger los datos que entre ellos se transporta. El presente trabajo, implementa una topología sencilla y propia de muchos de los clientes de CLARO, haciendo uso de dispositivos proporcionados por la misma empresa, y que se encuentran en el laboratorio de la sede Ortezal, sin afectar el desempeño normal de la red de CLARO. Actualmente, muy pocos ingenieros tienen conocimiento en este tema, por lo que para ellos, puede ser de gran ayuda para su aprendizaje, además de estudiar comandos y troubleshooting de una solución como esta.
publishDate 2015
dc.date.issued.none.fl_str_mv 2015
dc.date.accessioned.none.fl_str_mv 2017-06-16T22:35:08Z
2017-06-24T16:27:19Z
dc.date.available.none.fl_str_mv 2017-06-16T22:35:08Z
2017-06-24T16:27:19Z
dc.type.none.fl_str_mv bachelor thesis
dc.type.local.spa.fl_str_mv Tesis de pregrado
dc.type.version.none.fl_str_mv info:eu-repo/semantics/acceptedVersion
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.drive.none.fl_str_mv info:eu-repo/semantics/bachelorThesis
format http://purl.org/coar/resource_type/c_7a1f
status_str acceptedVersion
dc.identifier.citation.none.fl_str_mv Sánchez Escobar, J. F. (2015). Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional.
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/11634/2788
dc.identifier.reponame.spa.fl_str_mv reponame:Repositorio Institucional Universidad Santo Tomás
dc.identifier.instname.spa.fl_str_mv instname:Universidad Santo Tomás
dc.identifier.repourl.spa.fl_str_mv repourl:https://repository.usta.edu.co
identifier_str_mv Sánchez Escobar, J. F. (2015). Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional.
reponame:Repositorio Institucional Universidad Santo Tomás
instname:Universidad Santo Tomás
repourl:https://repository.usta.edu.co
url https://hdl.handle.net/11634/2788
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.references.none.fl_str_mv Andelić, A., Koprivica, M., & Božilović, B. (2011). Eksperimentalna analiza performansi VPN konekcije izmedu strongSwan klijenta i Cisco IOS IPsec gateway-a. 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers, 162–165. http://doi.org/10.1109/TELFOR.2011.6143517
Bahie-Eldin, M. a., & Omar, a. a. (1998). Complexity measure of encryption keys used for securing computer networks. Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 250–255. http://doi.org/10.1109/CSAC.1998.738645
Chou, L. Der, & Hong, M. Y. (2006). Design and implementation of two-level VPN service provisioning systems over MPLS networks. Proceedings of ISCN’06: 7th International Symosium on Computer Networks, 2006, 42–48. http://doi.org/10.1109/ISCN.2006.1662506
Confidential, C. (2006). Cisco Group Encrypted Transport VPN – Technical Overview Agenda Problem Statement Solution: Group Encrypted Transport Technology Components Feature Overview Provisioning and Management, (December).
Confidential, C. (2006). Tunnel-less VPN with Cisco Group Encrypted Transport (GET), (December), 1–17.
Cotter, R., & Medhi, D. (2009). Survivable design of reconfigurable MPLS VPN networks. Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, c, 78–85. http://doi.org/10.1109/DRCN.2009.5340021
Detienne, F. (2009). Advanced IPsec with. Transition, 1–44.
Eljack, S. M., & Abdelkarim, S. B. (2013). Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching Networks
Group Encrypted T ra ns port V P N PetrRůžička, CSE peru zick@cisco.com VPN Methods Summary. (n.d.), 1–36
Hota, C. H. C., Jha, S. K. J. S. K., & Raghurama, G. (2004). Distributed dynamic resource management in IPVPNs to guarantee quality of service. Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 1, 414–419. http://doi.org/10.1109/ICON.2004.1409186
Ishimura, K., Tamura, T., Mizuno, S., Sato, H., & Motono, T. (2010). Dynamic IP-VPN architecture with secure IPsec tunnels. Information and Telecommunication Technologies (APSITT), 2010 8th Asia-Pacific Symposium on.
Jiang, Z., & Xie, Y. (2011). Study and implement of VPN penetrating NAT based on IPSec protocol. Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering, TMEE 2011, 404–407. http://doi.org/10.1109/TMEE.2011.6199228
Manager, P., & Group, S. T. (2006). Tunnel-less VPN’s with Group Encrypted Transport (GET) VPN Siva Natarajan Presenter : Donovan Williams, Product Manager, Security Technology Group Agenda Problem Statement Solution Benefits Main Use Cases Higher Level View: How does it who
Meng, Z., Li, W., & Gao, Z. (2010). Context-based deep packet inspection of IKE phase one exchange in IPSec VPN. CICC-ITOE 2010 - 2010 International Conference on Innovative Computing and Communication, 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering, 3–6. http://doi.org/10.1109/CICCITOE.2010.8
Ming-Hui, L., & Jing-Bo, X. (2008). Research and simulation on VPN networking based on MPLS. 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, 1–4. http://doi.org/10.1109/WiCom.2008.997
Morris, T. H., & Nair, V. S. S. (2009). Encryption key protection: For private computing on public platforms. 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009. http://doi.org/10.1109/PERCOM.2009.4912897
Nguyen, K. V. (2006). Simplifying peer-to-peer device authentication using identity-based cryptography. International Conference on Networking and Services 2006, ICNS’06, 00(c). http://doi.org/10.1109/ICNS.2006.101
Okayama, K., Yamai, N., Ishibashi, H., Abe, K., & Matsuura, T. (2007). An efficient management method of access policies for hierarchical virtual private networks. Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007. http://doi.org/10.1109/COMSWA.2007.382593
Overview, P., & Architecture, P. (2009). Cisco Group Encrypted Transport VPN: Tunnelless VPN Delivering Encryption and Authentication for the WAN, (Figure 1), 1–8.
Shen, Y., Zhang, Q. F., Ping, L. Di, Wang, Y. F., & Li, W. J. (2012). A multi-tunnel VPN concurrent system for new generation network based on user space. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, 1334–1341. http://doi.org/10.1109/TrustCom.2012.41
Song, M., & Yun-he, Z. (2009). One new research about ipsec communication based on HTTP tunnel. Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, 253–257. http://doi.org/10.1109/ISPA.2009.44
Systems, C., & Republic, C. (2007). Group Encrypted Transport VPN PetrRůžička 3 Key Distribution: Group Domain of Interpretation, 115–120
Tanveer, A., Ali, A., Paracha, M. A., & Raja, F. R. (2015). Performance Analysis of AESFinalists along with SHS in IPSEC VPN over 1 Gbps Link, 323–332.
Wang, S., & Lv, H. (2011). A distributed object-based IPSec multi-tunnels concurrent architecture. 2011 International Conference on Computational Problem-Solving, ICCP 2011, 471–476. http://doi.org/10.1109/ICCPS.2011.6089933
Xia, J. B., Li, M. H., & Wan, L. J. (2008). Research on MPLS VPN networking application based on OPNET. 2008 International Symposium on Information Science and Engineering, ISISE 2008, 1, 404–408. http://doi.org/10.1109/ISISE.2008.129
dc.rights.*.fl_str_mv Atribución-NoComercial-SinDerivadas 2.5 Colombia
dc.rights.uri.*.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.rights.local.spa.fl_str_mv Abierto (Texto Completo)
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 2.5 Colombia
http://creativecommons.org/licenses/by-nc-nd/2.5/co/
Abierto (Texto Completo)
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.coverage.campus.spa.fl_str_mv CRAI-USTA Bogotá
dc.publisher.spa.fl_str_mv Universidad Santo Tomás
dc.publisher.program.spa.fl_str_mv Pregrado Ingeniería de Telecomunicaciones
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería de Telecomunicaciones
institution Universidad Santo Tomás
bitstream.url.fl_str_mv https://repository.usta.edu.co/bitstream/11634/2788/6/Sanchezjose2015.pdf.jpg
https://repository.usta.edu.co/bitstream/11634/2788/7/Sanchezjose2015a.pdf.jpg
https://repository.usta.edu.co/bitstream/11634/2788/8/Sanchezjose2015b.pdf.jpg
https://repository.usta.edu.co/bitstream/11634/2788/9/Sanchezjose2015c.pdf.jpg
https://repository.usta.edu.co/bitstream/11634/2788/12/2015cartadefacultad.pdf.jpg
https://repository.usta.edu.co/bitstream/11634/2788/13/2015cartadederechosdeautor.pdf.jpg
https://repository.usta.edu.co/bitstream/11634/2788/1/Sanchezjose2015.pdf
https://repository.usta.edu.co/bitstream/11634/2788/2/Sanchezjose2015a.pdf
https://repository.usta.edu.co/bitstream/11634/2788/3/Sanchezjose2015b.pdf
https://repository.usta.edu.co/bitstream/11634/2788/4/Sanchezjose2015c.pdf
https://repository.usta.edu.co/bitstream/11634/2788/10/2015cartadefacultad.pdf
https://repository.usta.edu.co/bitstream/11634/2788/11/2015cartadederechosdeautor.pdf
https://repository.usta.edu.co/bitstream/11634/2788/5/license.txt
bitstream.checksum.fl_str_mv 262f11b7284d1ec705646f865f47cc5a
ace6f5191bb2d3b65eaf8a60ccc98f76
83ec983da554a347b23b14ee11fcdfad
100eb9a205ebfcc179c010a253f99205
6db41242805118a2d48c020a9a0997c1
8881518874cd502d07e6eb94af0cfcf9
9f5ecca16d48a6148aefad449b6eda75
faf1cf46f4161fa2132df06d14dfe4c1
172d7382684ecda0bd67271a5ecaf606
97a317d683c022e9ff00ec2432060f84
8637b0e094d4aca1e5bb17c59e302d7e
5c27db96918deb478395309d9c3251fc
8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Universidad Santo Tomás
repository.mail.fl_str_mv repositorio@usta.edu.co
_version_ 1860882111242698752
spelling Díaz Pardo, Iván EduardoSánchez Escobar, José Fernandohttps://scholar.google.com/citations?hl=es&user=s301RbcAAAAJhttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000688860Universidad Santo Tomás2017-06-16T22:35:08Z2017-06-24T16:27:19Z2017-06-16T22:35:08Z2017-06-24T16:27:19Z2015Sánchez Escobar, J. F. (2015). Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional.https://hdl.handle.net/11634/2788reponame:Repositorio Institucional Universidad Santo Tomásinstname:Universidad Santo Tomásrepourl:https://repository.usta.edu.coEsta monografía presenta el desarrollo e implementación práctica de un laboratorio GET VPN, para el uso del personal del NOC corporativo de la compañía CLARO COLOMBIA S.A., haciendo uso de guías, manuales, parámetros y procedimientos de configuración relacionados, dentro de la operación del NOC. Group Encrypted Transport, (GET VPN), permite cifrar tráfico generado entre dispositivos como switches y routers. Es posible crear diferentes grupos de estos dispositivos, con el fin de proteger los datos que entre ellos se transporta. El presente trabajo, implementa una topología sencilla y propia de muchos de los clientes de CLARO, haciendo uso de dispositivos proporcionados por la misma empresa, y que se encuentran en el laboratorio de la sede Ortezal, sin afectar el desempeño normal de la red de CLARO. Actualmente, muy pocos ingenieros tienen conocimiento en este tema, por lo que para ellos, puede ser de gran ayuda para su aprendizaje, además de estudiar comandos y troubleshooting de una solución como esta.This monograph presents the development and practical implementation of a laboratory GET VPN, for the use of corporate NOC staff of the company CLARO COLOMBIA S.A., using guides, manuals, parameters and procedures related configuration, within the operation of the NOC. Group Encryption Transport (GET VPN), allows encrypting traffic generated between devices such as switches and routers. It is possible to create different groups of these devices, in order to protect the data that are transported between them. This paper implemts a simple topology and similar of many CLARO’s customers, doing use of devices supplied by the same company, without affecting normal network CLARO performance. Currently, very few engineers are knowledgeable in this subject, so this document can be helpful for learning of them, besides studying commands and troubleshooting of a solution like this.Ingeniero de TelecomunicacionesPregradoapplication/pdfspaUniversidad Santo TomásPregrado Ingeniería de TelecomunicacionesFacultad de Ingeniería de TelecomunicacionesAtribución-NoComercial-SinDerivadas 2.5 Colombiahttp://creativecommons.org/licenses/by-nc-nd/2.5/co/Abierto (Texto Completo)info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.bachelor thesisTesis de pregradoinfo:eu-repo/semantics/acceptedVersionhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesisGroup MemberKey ServerTroubleshootingIngeniería de TelecomunicacionesComunicaciónInvestigaciónCifradoConectividadCRAI-USTA BogotáAndelić, A., Koprivica, M., & Božilović, B. (2011). Eksperimentalna analiza performansi VPN konekcije izmedu strongSwan klijenta i Cisco IOS IPsec gateway-a. 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers, 162–165. http://doi.org/10.1109/TELFOR.2011.6143517Bahie-Eldin, M. a., & Omar, a. a. (1998). Complexity measure of encryption keys used for securing computer networks. Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 250–255. http://doi.org/10.1109/CSAC.1998.738645Chou, L. Der, & Hong, M. Y. (2006). Design and implementation of two-level VPN service provisioning systems over MPLS networks. Proceedings of ISCN’06: 7th International Symosium on Computer Networks, 2006, 42–48. http://doi.org/10.1109/ISCN.2006.1662506Confidential, C. (2006). Cisco Group Encrypted Transport VPN – Technical Overview Agenda Problem Statement Solution: Group Encrypted Transport Technology Components Feature Overview Provisioning and Management, (December).Confidential, C. (2006). Tunnel-less VPN with Cisco Group Encrypted Transport (GET), (December), 1–17.Cotter, R., & Medhi, D. (2009). Survivable design of reconfigurable MPLS VPN networks. Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, c, 78–85. http://doi.org/10.1109/DRCN.2009.5340021Detienne, F. (2009). Advanced IPsec with. Transition, 1–44.Eljack, S. M., & Abdelkarim, S. B. (2013). Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching NetworksGroup Encrypted T ra ns port V P N PetrRůžička, CSE peru zick@cisco.com VPN Methods Summary. (n.d.), 1–36Hota, C. H. C., Jha, S. K. J. S. K., & Raghurama, G. (2004). Distributed dynamic resource management in IPVPNs to guarantee quality of service. Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 1, 414–419. http://doi.org/10.1109/ICON.2004.1409186Ishimura, K., Tamura, T., Mizuno, S., Sato, H., & Motono, T. (2010). Dynamic IP-VPN architecture with secure IPsec tunnels. Information and Telecommunication Technologies (APSITT), 2010 8th Asia-Pacific Symposium on.Jiang, Z., & Xie, Y. (2011). Study and implement of VPN penetrating NAT based on IPSec protocol. Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering, TMEE 2011, 404–407. http://doi.org/10.1109/TMEE.2011.6199228Manager, P., & Group, S. T. (2006). Tunnel-less VPN’s with Group Encrypted Transport (GET) VPN Siva Natarajan Presenter : Donovan Williams, Product Manager, Security Technology Group Agenda Problem Statement Solution Benefits Main Use Cases Higher Level View: How does it whoMeng, Z., Li, W., & Gao, Z. (2010). Context-based deep packet inspection of IKE phase one exchange in IPSec VPN. CICC-ITOE 2010 - 2010 International Conference on Innovative Computing and Communication, 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering, 3–6. http://doi.org/10.1109/CICCITOE.2010.8Ming-Hui, L., & Jing-Bo, X. (2008). Research and simulation on VPN networking based on MPLS. 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, 1–4. http://doi.org/10.1109/WiCom.2008.997Morris, T. H., & Nair, V. S. S. (2009). Encryption key protection: For private computing on public platforms. 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009. http://doi.org/10.1109/PERCOM.2009.4912897Nguyen, K. V. (2006). Simplifying peer-to-peer device authentication using identity-based cryptography. International Conference on Networking and Services 2006, ICNS’06, 00(c). http://doi.org/10.1109/ICNS.2006.101Okayama, K., Yamai, N., Ishibashi, H., Abe, K., & Matsuura, T. (2007). An efficient management method of access policies for hierarchical virtual private networks. Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007. http://doi.org/10.1109/COMSWA.2007.382593Overview, P., & Architecture, P. (2009). Cisco Group Encrypted Transport VPN: Tunnelless VPN Delivering Encryption and Authentication for the WAN, (Figure 1), 1–8.Shen, Y., Zhang, Q. F., Ping, L. Di, Wang, Y. F., & Li, W. J. (2012). A multi-tunnel VPN concurrent system for new generation network based on user space. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, 1334–1341. http://doi.org/10.1109/TrustCom.2012.41Song, M., & Yun-he, Z. (2009). One new research about ipsec communication based on HTTP tunnel. Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, 253–257. http://doi.org/10.1109/ISPA.2009.44Systems, C., & Republic, C. (2007). Group Encrypted Transport VPN PetrRůžička 3 Key Distribution: Group Domain of Interpretation, 115–120Tanveer, A., Ali, A., Paracha, M. A., & Raja, F. R. (2015). Performance Analysis of AESFinalists along with SHS in IPSEC VPN over 1 Gbps Link, 323–332.Wang, S., & Lv, H. (2011). A distributed object-based IPSec multi-tunnels concurrent architecture. 2011 International Conference on Computational Problem-Solving, ICCP 2011, 471–476. http://doi.org/10.1109/ICCPS.2011.6089933Xia, J. B., Li, M. H., & Wan, L. J. (2008). Research on MPLS VPN networking application based on OPNET. 2008 International Symposium on Information Science and Engineering, ISISE 2008, 1, 404–408. http://doi.org/10.1109/ISISE.2008.129THUMBNAILSanchezjose2015.pdf.jpgSanchezjose2015.pdf.jpgIM Thumbnailimage/jpeg4637https://repository.usta.edu.co/bitstream/11634/2788/6/Sanchezjose2015.pdf.jpg262f11b7284d1ec705646f865f47cc5aMD56open accessSanchezjose2015a.pdf.jpgSanchezjose2015a.pdf.jpgIM Thumbnailimage/jpeg6144https://repository.usta.edu.co/bitstream/11634/2788/7/Sanchezjose2015a.pdf.jpgace6f5191bb2d3b65eaf8a60ccc98f76MD57open accessSanchezjose2015b.pdf.jpgSanchezjose2015b.pdf.jpgIM Thumbnailimage/jpeg5985https://repository.usta.edu.co/bitstream/11634/2788/8/Sanchezjose2015b.pdf.jpg83ec983da554a347b23b14ee11fcdfadMD58open accessSanchezjose2015c.pdf.jpgSanchezjose2015c.pdf.jpgIM Thumbnailimage/jpeg5620https://repository.usta.edu.co/bitstream/11634/2788/9/Sanchezjose2015c.pdf.jpg100eb9a205ebfcc179c010a253f99205MD59open access2015cartadefacultad.pdf.jpg2015cartadefacultad.pdf.jpgIM Thumbnailimage/jpeg7966https://repository.usta.edu.co/bitstream/11634/2788/12/2015cartadefacultad.pdf.jpg6db41242805118a2d48c020a9a0997c1MD512open access2015cartadederechosdeautor.pdf.jpg2015cartadederechosdeautor.pdf.jpgIM Thumbnailimage/jpeg7425https://repository.usta.edu.co/bitstream/11634/2788/13/2015cartadederechosdeautor.pdf.jpg8881518874cd502d07e6eb94af0cfcf9MD513open accessORIGINALSanchezjose2015.pdfapplication/pdf2376977https://repository.usta.edu.co/bitstream/11634/2788/1/Sanchezjose2015.pdf9f5ecca16d48a6148aefad449b6eda75MD51open accessSanchezjose2015a.pdfapplication/pdf1762170https://repository.usta.edu.co/bitstream/11634/2788/2/Sanchezjose2015a.pdffaf1cf46f4161fa2132df06d14dfe4c1MD52open accessSanchezjose2015b.pdfapplication/pdf1843013https://repository.usta.edu.co/bitstream/11634/2788/3/Sanchezjose2015b.pdf172d7382684ecda0bd67271a5ecaf606MD53open accessSanchezjose2015c.pdfapplication/pdf928384https://repository.usta.edu.co/bitstream/11634/2788/4/Sanchezjose2015c.pdf97a317d683c022e9ff00ec2432060f84MD54open access2015cartadefacultad.pdf2015cartadefacultad.pdfapplication/pdf76796https://repository.usta.edu.co/bitstream/11634/2788/10/2015cartadefacultad.pdf8637b0e094d4aca1e5bb17c59e302d7eMD510metadata only access2015cartadederechosdeautor.pdf2015cartadederechosdeautor.pdfapplication/pdf59906https://repository.usta.edu.co/bitstream/11634/2788/11/2015cartadederechosdeautor.pdf5c27db96918deb478395309d9c3251fcMD511metadata only accessLICENSElicense.txttext/plain1748https://repository.usta.edu.co/bitstream/11634/2788/5/license.txt8a4605be74aa9ea9d79846c1fba20a33MD55open access11634/2788oai:repository.usta.edu.co:11634/27882024-07-08 09:19:18.884open accessRepositorio Universidad Santo Tomásrepositorio@usta.edu.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