Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.
Esta monografía presenta el desarrollo e implementación práctica de un laboratorio GET VPN, para el uso del personal del NOC corporativo de la compañía CLARO COLOMBIA S.A., haciendo uso de guías, manuales, parámetros y procedimientos de configuración relacionados, dentro de la operación del NOC. Gro...
- Autores:
-
Sánchez Escobar, José Fernando
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2015
- Institución:
- Universidad Santo Tomás
- Repositorio:
- Repositorio Institucional USTA
- Idioma:
- spa
- OAI Identifier:
- oai:repository.usta.edu.co:11634/2788
- Acceso en línea:
- https://hdl.handle.net/11634/2788
- Palabra clave:
- Group Member
Key Server
Troubleshooting
Ingeniería de Telecomunicaciones
Comunicación
Investigación
Cifrado
Conectividad
- Rights
- openAccess
- License
- Atribución-NoComercial-SinDerivadas 2.5 Colombia
| id |
SANTOTOMAS_4264f466cd8f09cc11d52cd09d349802 |
|---|---|
| oai_identifier_str |
oai:repository.usta.edu.co:11634/2788 |
| network_acronym_str |
SANTOTOMAS |
| network_name_str |
Repositorio Institucional USTA |
| repository_id_str |
|
| dc.title.none.fl_str_mv |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| title |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| spellingShingle |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. Group Member Key Server Troubleshooting Ingeniería de Telecomunicaciones Comunicación Investigación Cifrado Conectividad |
| title_short |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| title_full |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| title_fullStr |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| title_full_unstemmed |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| title_sort |
Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. |
| dc.creator.fl_str_mv |
Sánchez Escobar, José Fernando |
| dc.contributor.advisor.none.fl_str_mv |
Díaz Pardo, Iván Eduardo |
| dc.contributor.author.none.fl_str_mv |
Sánchez Escobar, José Fernando |
| dc.contributor.googlescholar.none.fl_str_mv |
https://scholar.google.com/citations?hl=es&user=s301RbcAAAAJ |
| dc.contributor.cvlac.none.fl_str_mv |
https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000688860 |
| dc.contributor.corporatename.none.fl_str_mv |
Universidad Santo Tomás |
| dc.subject.keyword.spa.fl_str_mv |
Group Member Key Server Troubleshooting |
| topic |
Group Member Key Server Troubleshooting Ingeniería de Telecomunicaciones Comunicación Investigación Cifrado Conectividad |
| dc.subject.lemb.none.fl_str_mv |
Ingeniería de Telecomunicaciones Comunicación Investigación |
| dc.subject.proposal.spa.fl_str_mv |
Cifrado Conectividad |
| description |
Esta monografía presenta el desarrollo e implementación práctica de un laboratorio GET VPN, para el uso del personal del NOC corporativo de la compañía CLARO COLOMBIA S.A., haciendo uso de guías, manuales, parámetros y procedimientos de configuración relacionados, dentro de la operación del NOC. Group Encrypted Transport, (GET VPN), permite cifrar tráfico generado entre dispositivos como switches y routers. Es posible crear diferentes grupos de estos dispositivos, con el fin de proteger los datos que entre ellos se transporta. El presente trabajo, implementa una topología sencilla y propia de muchos de los clientes de CLARO, haciendo uso de dispositivos proporcionados por la misma empresa, y que se encuentran en el laboratorio de la sede Ortezal, sin afectar el desempeño normal de la red de CLARO. Actualmente, muy pocos ingenieros tienen conocimiento en este tema, por lo que para ellos, puede ser de gran ayuda para su aprendizaje, además de estudiar comandos y troubleshooting de una solución como esta. |
| publishDate |
2015 |
| dc.date.issued.none.fl_str_mv |
2015 |
| dc.date.accessioned.none.fl_str_mv |
2017-06-16T22:35:08Z 2017-06-24T16:27:19Z |
| dc.date.available.none.fl_str_mv |
2017-06-16T22:35:08Z 2017-06-24T16:27:19Z |
| dc.type.none.fl_str_mv |
bachelor thesis |
| dc.type.local.spa.fl_str_mv |
Tesis de pregrado |
| dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
| dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
| dc.type.drive.none.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
| format |
http://purl.org/coar/resource_type/c_7a1f |
| status_str |
acceptedVersion |
| dc.identifier.citation.none.fl_str_mv |
Sánchez Escobar, J. F. (2015). Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional. |
| dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/11634/2788 |
| dc.identifier.reponame.spa.fl_str_mv |
reponame:Repositorio Institucional Universidad Santo Tomás |
| dc.identifier.instname.spa.fl_str_mv |
instname:Universidad Santo Tomás |
| dc.identifier.repourl.spa.fl_str_mv |
repourl:https://repository.usta.edu.co |
| identifier_str_mv |
Sánchez Escobar, J. F. (2015). Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional. reponame:Repositorio Institucional Universidad Santo Tomás instname:Universidad Santo Tomás repourl:https://repository.usta.edu.co |
| url |
https://hdl.handle.net/11634/2788 |
| dc.language.iso.spa.fl_str_mv |
spa |
| language |
spa |
| dc.relation.references.none.fl_str_mv |
Andelić, A., Koprivica, M., & Božilović, B. (2011). Eksperimentalna analiza performansi VPN konekcije izmedu strongSwan klijenta i Cisco IOS IPsec gateway-a. 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers, 162–165. http://doi.org/10.1109/TELFOR.2011.6143517 Bahie-Eldin, M. a., & Omar, a. a. (1998). Complexity measure of encryption keys used for securing computer networks. Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 250–255. http://doi.org/10.1109/CSAC.1998.738645 Chou, L. Der, & Hong, M. Y. (2006). Design and implementation of two-level VPN service provisioning systems over MPLS networks. Proceedings of ISCN’06: 7th International Symosium on Computer Networks, 2006, 42–48. http://doi.org/10.1109/ISCN.2006.1662506 Confidential, C. (2006). Cisco Group Encrypted Transport VPN – Technical Overview Agenda Problem Statement Solution: Group Encrypted Transport Technology Components Feature Overview Provisioning and Management, (December). Confidential, C. (2006). Tunnel-less VPN with Cisco Group Encrypted Transport (GET), (December), 1–17. Cotter, R., & Medhi, D. (2009). Survivable design of reconfigurable MPLS VPN networks. Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, c, 78–85. http://doi.org/10.1109/DRCN.2009.5340021 Detienne, F. (2009). Advanced IPsec with. Transition, 1–44. Eljack, S. M., & Abdelkarim, S. B. (2013). Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching Networks Group Encrypted T ra ns port V P N PetrRůžička, CSE peru zick@cisco.com VPN Methods Summary. (n.d.), 1–36 Hota, C. H. C., Jha, S. K. J. S. K., & Raghurama, G. (2004). Distributed dynamic resource management in IPVPNs to guarantee quality of service. Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 1, 414–419. http://doi.org/10.1109/ICON.2004.1409186 Ishimura, K., Tamura, T., Mizuno, S., Sato, H., & Motono, T. (2010). Dynamic IP-VPN architecture with secure IPsec tunnels. Information and Telecommunication Technologies (APSITT), 2010 8th Asia-Pacific Symposium on. Jiang, Z., & Xie, Y. (2011). Study and implement of VPN penetrating NAT based on IPSec protocol. Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering, TMEE 2011, 404–407. http://doi.org/10.1109/TMEE.2011.6199228 Manager, P., & Group, S. T. (2006). Tunnel-less VPN’s with Group Encrypted Transport (GET) VPN Siva Natarajan Presenter : Donovan Williams, Product Manager, Security Technology Group Agenda Problem Statement Solution Benefits Main Use Cases Higher Level View: How does it who Meng, Z., Li, W., & Gao, Z. (2010). Context-based deep packet inspection of IKE phase one exchange in IPSec VPN. CICC-ITOE 2010 - 2010 International Conference on Innovative Computing and Communication, 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering, 3–6. http://doi.org/10.1109/CICCITOE.2010.8 Ming-Hui, L., & Jing-Bo, X. (2008). Research and simulation on VPN networking based on MPLS. 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, 1–4. http://doi.org/10.1109/WiCom.2008.997 Morris, T. H., & Nair, V. S. S. (2009). Encryption key protection: For private computing on public platforms. 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009. http://doi.org/10.1109/PERCOM.2009.4912897 Nguyen, K. V. (2006). Simplifying peer-to-peer device authentication using identity-based cryptography. International Conference on Networking and Services 2006, ICNS’06, 00(c). http://doi.org/10.1109/ICNS.2006.101 Okayama, K., Yamai, N., Ishibashi, H., Abe, K., & Matsuura, T. (2007). An efficient management method of access policies for hierarchical virtual private networks. Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007. http://doi.org/10.1109/COMSWA.2007.382593 Overview, P., & Architecture, P. (2009). Cisco Group Encrypted Transport VPN: Tunnelless VPN Delivering Encryption and Authentication for the WAN, (Figure 1), 1–8. Shen, Y., Zhang, Q. F., Ping, L. Di, Wang, Y. F., & Li, W. J. (2012). A multi-tunnel VPN concurrent system for new generation network based on user space. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, 1334–1341. http://doi.org/10.1109/TrustCom.2012.41 Song, M., & Yun-he, Z. (2009). One new research about ipsec communication based on HTTP tunnel. Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, 253–257. http://doi.org/10.1109/ISPA.2009.44 Systems, C., & Republic, C. (2007). Group Encrypted Transport VPN PetrRůžička 3 Key Distribution: Group Domain of Interpretation, 115–120 Tanveer, A., Ali, A., Paracha, M. A., & Raja, F. R. (2015). Performance Analysis of AESFinalists along with SHS in IPSEC VPN over 1 Gbps Link, 323–332. Wang, S., & Lv, H. (2011). A distributed object-based IPSec multi-tunnels concurrent architecture. 2011 International Conference on Computational Problem-Solving, ICCP 2011, 471–476. http://doi.org/10.1109/ICCPS.2011.6089933 Xia, J. B., Li, M. H., & Wan, L. J. (2008). Research on MPLS VPN networking application based on OPNET. 2008 International Symposium on Information Science and Engineering, ISISE 2008, 1, 404–408. http://doi.org/10.1109/ISISE.2008.129 |
| dc.rights.*.fl_str_mv |
Atribución-NoComercial-SinDerivadas 2.5 Colombia |
| dc.rights.uri.*.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/2.5/co/ |
| dc.rights.local.spa.fl_str_mv |
Abierto (Texto Completo) |
| dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/openAccess |
| dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
| rights_invalid_str_mv |
Atribución-NoComercial-SinDerivadas 2.5 Colombia http://creativecommons.org/licenses/by-nc-nd/2.5/co/ Abierto (Texto Completo) http://purl.org/coar/access_right/c_abf2 |
| eu_rights_str_mv |
openAccess |
| dc.format.mimetype.spa.fl_str_mv |
application/pdf |
| dc.coverage.campus.spa.fl_str_mv |
CRAI-USTA Bogotá |
| dc.publisher.spa.fl_str_mv |
Universidad Santo Tomás |
| dc.publisher.program.spa.fl_str_mv |
Pregrado Ingeniería de Telecomunicaciones |
| dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería de Telecomunicaciones |
| institution |
Universidad Santo Tomás |
| bitstream.url.fl_str_mv |
https://repository.usta.edu.co/bitstream/11634/2788/6/Sanchezjose2015.pdf.jpg https://repository.usta.edu.co/bitstream/11634/2788/7/Sanchezjose2015a.pdf.jpg https://repository.usta.edu.co/bitstream/11634/2788/8/Sanchezjose2015b.pdf.jpg https://repository.usta.edu.co/bitstream/11634/2788/9/Sanchezjose2015c.pdf.jpg https://repository.usta.edu.co/bitstream/11634/2788/12/2015cartadefacultad.pdf.jpg https://repository.usta.edu.co/bitstream/11634/2788/13/2015cartadederechosdeautor.pdf.jpg https://repository.usta.edu.co/bitstream/11634/2788/1/Sanchezjose2015.pdf https://repository.usta.edu.co/bitstream/11634/2788/2/Sanchezjose2015a.pdf https://repository.usta.edu.co/bitstream/11634/2788/3/Sanchezjose2015b.pdf https://repository.usta.edu.co/bitstream/11634/2788/4/Sanchezjose2015c.pdf https://repository.usta.edu.co/bitstream/11634/2788/10/2015cartadefacultad.pdf https://repository.usta.edu.co/bitstream/11634/2788/11/2015cartadederechosdeautor.pdf https://repository.usta.edu.co/bitstream/11634/2788/5/license.txt |
| bitstream.checksum.fl_str_mv |
262f11b7284d1ec705646f865f47cc5a ace6f5191bb2d3b65eaf8a60ccc98f76 83ec983da554a347b23b14ee11fcdfad 100eb9a205ebfcc179c010a253f99205 6db41242805118a2d48c020a9a0997c1 8881518874cd502d07e6eb94af0cfcf9 9f5ecca16d48a6148aefad449b6eda75 faf1cf46f4161fa2132df06d14dfe4c1 172d7382684ecda0bd67271a5ecaf606 97a317d683c022e9ff00ec2432060f84 8637b0e094d4aca1e5bb17c59e302d7e 5c27db96918deb478395309d9c3251fc 8a4605be74aa9ea9d79846c1fba20a33 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Repositorio Universidad Santo Tomás |
| repository.mail.fl_str_mv |
repositorio@usta.edu.co |
| _version_ |
1860882111242698752 |
| spelling |
Díaz Pardo, Iván EduardoSánchez Escobar, José Fernandohttps://scholar.google.com/citations?hl=es&user=s301RbcAAAAJhttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000688860Universidad Santo Tomás2017-06-16T22:35:08Z2017-06-24T16:27:19Z2017-06-16T22:35:08Z2017-06-24T16:27:19Z2015Sánchez Escobar, J. F. (2015). Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A. [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional.https://hdl.handle.net/11634/2788reponame:Repositorio Institucional Universidad Santo Tomásinstname:Universidad Santo Tomásrepourl:https://repository.usta.edu.coEsta monografía presenta el desarrollo e implementación práctica de un laboratorio GET VPN, para el uso del personal del NOC corporativo de la compañía CLARO COLOMBIA S.A., haciendo uso de guías, manuales, parámetros y procedimientos de configuración relacionados, dentro de la operación del NOC. Group Encrypted Transport, (GET VPN), permite cifrar tráfico generado entre dispositivos como switches y routers. Es posible crear diferentes grupos de estos dispositivos, con el fin de proteger los datos que entre ellos se transporta. El presente trabajo, implementa una topología sencilla y propia de muchos de los clientes de CLARO, haciendo uso de dispositivos proporcionados por la misma empresa, y que se encuentran en el laboratorio de la sede Ortezal, sin afectar el desempeño normal de la red de CLARO. Actualmente, muy pocos ingenieros tienen conocimiento en este tema, por lo que para ellos, puede ser de gran ayuda para su aprendizaje, además de estudiar comandos y troubleshooting de una solución como esta.This monograph presents the development and practical implementation of a laboratory GET VPN, for the use of corporate NOC staff of the company CLARO COLOMBIA S.A., using guides, manuals, parameters and procedures related configuration, within the operation of the NOC. Group Encryption Transport (GET VPN), allows encrypting traffic generated between devices such as switches and routers. It is possible to create different groups of these devices, in order to protect the data that are transported between them. This paper implemts a simple topology and similar of many CLARO’s customers, doing use of devices supplied by the same company, without affecting normal network CLARO performance. Currently, very few engineers are knowledgeable in this subject, so this document can be helpful for learning of them, besides studying commands and troubleshooting of a solution like this.Ingeniero de TelecomunicacionesPregradoapplication/pdfspaUniversidad Santo TomásPregrado Ingeniería de TelecomunicacionesFacultad de Ingeniería de TelecomunicacionesAtribución-NoComercial-SinDerivadas 2.5 Colombiahttp://creativecommons.org/licenses/by-nc-nd/2.5/co/Abierto (Texto Completo)info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Propuesta de desarrollo e implementación práctica de laboratorio GET VPN para la empresa Claro Colombia S.A.bachelor thesisTesis de pregradoinfo:eu-repo/semantics/acceptedVersionhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesisGroup MemberKey ServerTroubleshootingIngeniería de TelecomunicacionesComunicaciónInvestigaciónCifradoConectividadCRAI-USTA BogotáAndelić, A., Koprivica, M., & Božilović, B. (2011). Eksperimentalna analiza performansi VPN konekcije izmedu strongSwan klijenta i Cisco IOS IPsec gateway-a. 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers, 162–165. http://doi.org/10.1109/TELFOR.2011.6143517Bahie-Eldin, M. a., & Omar, a. a. (1998). Complexity measure of encryption keys used for securing computer networks. Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 250–255. http://doi.org/10.1109/CSAC.1998.738645Chou, L. Der, & Hong, M. Y. (2006). Design and implementation of two-level VPN service provisioning systems over MPLS networks. Proceedings of ISCN’06: 7th International Symosium on Computer Networks, 2006, 42–48. http://doi.org/10.1109/ISCN.2006.1662506Confidential, C. (2006). Cisco Group Encrypted Transport VPN – Technical Overview Agenda Problem Statement Solution: Group Encrypted Transport Technology Components Feature Overview Provisioning and Management, (December).Confidential, C. (2006). Tunnel-less VPN with Cisco Group Encrypted Transport (GET), (December), 1–17.Cotter, R., & Medhi, D. (2009). Survivable design of reconfigurable MPLS VPN networks. Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009, c, 78–85. http://doi.org/10.1109/DRCN.2009.5340021Detienne, F. (2009). Advanced IPsec with. Transition, 1–44.Eljack, S. M., & Abdelkarim, S. B. (2013). Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching NetworksGroup Encrypted T ra ns port V P N PetrRůžička, CSE peru zick@cisco.com VPN Methods Summary. (n.d.), 1–36Hota, C. H. C., Jha, S. K. J. S. K., & Raghurama, G. (2004). Distributed dynamic resource management in IPVPNs to guarantee quality of service. Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 1, 414–419. http://doi.org/10.1109/ICON.2004.1409186Ishimura, K., Tamura, T., Mizuno, S., Sato, H., & Motono, T. (2010). Dynamic IP-VPN architecture with secure IPsec tunnels. Information and Telecommunication Technologies (APSITT), 2010 8th Asia-Pacific Symposium on.Jiang, Z., & Xie, Y. (2011). Study and implement of VPN penetrating NAT based on IPSec protocol. Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering, TMEE 2011, 404–407. http://doi.org/10.1109/TMEE.2011.6199228Manager, P., & Group, S. T. (2006). Tunnel-less VPN’s with Group Encrypted Transport (GET) VPN Siva Natarajan Presenter : Donovan Williams, Product Manager, Security Technology Group Agenda Problem Statement Solution Benefits Main Use Cases Higher Level View: How does it whoMeng, Z., Li, W., & Gao, Z. (2010). Context-based deep packet inspection of IKE phase one exchange in IPSec VPN. CICC-ITOE 2010 - 2010 International Conference on Innovative Computing and Communication, 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering, 3–6. http://doi.org/10.1109/CICCITOE.2010.8Ming-Hui, L., & Jing-Bo, X. (2008). Research and simulation on VPN networking based on MPLS. 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, 1–4. http://doi.org/10.1109/WiCom.2008.997Morris, T. H., & Nair, V. S. S. (2009). Encryption key protection: For private computing on public platforms. 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009. http://doi.org/10.1109/PERCOM.2009.4912897Nguyen, K. V. (2006). Simplifying peer-to-peer device authentication using identity-based cryptography. International Conference on Networking and Services 2006, ICNS’06, 00(c). http://doi.org/10.1109/ICNS.2006.101Okayama, K., Yamai, N., Ishibashi, H., Abe, K., & Matsuura, T. (2007). An efficient management method of access policies for hierarchical virtual private networks. Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007. http://doi.org/10.1109/COMSWA.2007.382593Overview, P., & Architecture, P. (2009). Cisco Group Encrypted Transport VPN: Tunnelless VPN Delivering Encryption and Authentication for the WAN, (Figure 1), 1–8.Shen, Y., Zhang, Q. F., Ping, L. Di, Wang, Y. F., & Li, W. J. (2012). A multi-tunnel VPN concurrent system for new generation network based on user space. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, 1334–1341. http://doi.org/10.1109/TrustCom.2012.41Song, M., & Yun-he, Z. (2009). One new research about ipsec communication based on HTTP tunnel. Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, 253–257. http://doi.org/10.1109/ISPA.2009.44Systems, C., & Republic, C. (2007). Group Encrypted Transport VPN PetrRůžička 3 Key Distribution: Group Domain of Interpretation, 115–120Tanveer, A., Ali, A., Paracha, M. A., & Raja, F. R. (2015). Performance Analysis of AESFinalists along with SHS in IPSEC VPN over 1 Gbps Link, 323–332.Wang, S., & Lv, H. (2011). A distributed object-based IPSec multi-tunnels concurrent architecture. 2011 International Conference on Computational Problem-Solving, ICCP 2011, 471–476. http://doi.org/10.1109/ICCPS.2011.6089933Xia, J. B., Li, M. H., & Wan, L. J. (2008). Research on MPLS VPN networking application based on OPNET. 2008 International Symposium on Information Science and Engineering, ISISE 2008, 1, 404–408. http://doi.org/10.1109/ISISE.2008.129THUMBNAILSanchezjose2015.pdf.jpgSanchezjose2015.pdf.jpgIM Thumbnailimage/jpeg4637https://repository.usta.edu.co/bitstream/11634/2788/6/Sanchezjose2015.pdf.jpg262f11b7284d1ec705646f865f47cc5aMD56open accessSanchezjose2015a.pdf.jpgSanchezjose2015a.pdf.jpgIM Thumbnailimage/jpeg6144https://repository.usta.edu.co/bitstream/11634/2788/7/Sanchezjose2015a.pdf.jpgace6f5191bb2d3b65eaf8a60ccc98f76MD57open accessSanchezjose2015b.pdf.jpgSanchezjose2015b.pdf.jpgIM Thumbnailimage/jpeg5985https://repository.usta.edu.co/bitstream/11634/2788/8/Sanchezjose2015b.pdf.jpg83ec983da554a347b23b14ee11fcdfadMD58open accessSanchezjose2015c.pdf.jpgSanchezjose2015c.pdf.jpgIM Thumbnailimage/jpeg5620https://repository.usta.edu.co/bitstream/11634/2788/9/Sanchezjose2015c.pdf.jpg100eb9a205ebfcc179c010a253f99205MD59open access2015cartadefacultad.pdf.jpg2015cartadefacultad.pdf.jpgIM Thumbnailimage/jpeg7966https://repository.usta.edu.co/bitstream/11634/2788/12/2015cartadefacultad.pdf.jpg6db41242805118a2d48c020a9a0997c1MD512open access2015cartadederechosdeautor.pdf.jpg2015cartadederechosdeautor.pdf.jpgIM Thumbnailimage/jpeg7425https://repository.usta.edu.co/bitstream/11634/2788/13/2015cartadederechosdeautor.pdf.jpg8881518874cd502d07e6eb94af0cfcf9MD513open accessORIGINALSanchezjose2015.pdfapplication/pdf2376977https://repository.usta.edu.co/bitstream/11634/2788/1/Sanchezjose2015.pdf9f5ecca16d48a6148aefad449b6eda75MD51open accessSanchezjose2015a.pdfapplication/pdf1762170https://repository.usta.edu.co/bitstream/11634/2788/2/Sanchezjose2015a.pdffaf1cf46f4161fa2132df06d14dfe4c1MD52open accessSanchezjose2015b.pdfapplication/pdf1843013https://repository.usta.edu.co/bitstream/11634/2788/3/Sanchezjose2015b.pdf172d7382684ecda0bd67271a5ecaf606MD53open accessSanchezjose2015c.pdfapplication/pdf928384https://repository.usta.edu.co/bitstream/11634/2788/4/Sanchezjose2015c.pdf97a317d683c022e9ff00ec2432060f84MD54open access2015cartadefacultad.pdf2015cartadefacultad.pdfapplication/pdf76796https://repository.usta.edu.co/bitstream/11634/2788/10/2015cartadefacultad.pdf8637b0e094d4aca1e5bb17c59e302d7eMD510metadata only access2015cartadederechosdeautor.pdf2015cartadederechosdeautor.pdfapplication/pdf59906https://repository.usta.edu.co/bitstream/11634/2788/11/2015cartadederechosdeautor.pdf5c27db96918deb478395309d9c3251fcMD511metadata only accessLICENSElicense.txttext/plain1748https://repository.usta.edu.co/bitstream/11634/2788/5/license.txt8a4605be74aa9ea9d79846c1fba20a33MD55open access11634/2788oai:repository.usta.edu.co:11634/27882024-07-08 09:19:18.884open accessRepositorio Universidad Santo Tomásrepositorio@usta.edu.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 |
