%-----------------------------------------------------------------------------
\chapter{Introduction (Hausegger)}
%-----------------------------------------------------------------------------

%-----------------------------------------------------------------------------
\section{Motivation}
%-----------------------------------------------------------------------------
%todo
%cite suchen - für diese Arbeit eher nicht notwendig oder
{\bf Accessing ressources over networks which are not secured by a firewall
is often a very risky and dangerous issue.} Network administrators are able to
eavesdrop, alter and interfere with traffic that passes through cables or a WIFI
connection, even if they have no in-depth knowledge. This can even happen if
network traffic is encrypted. \underline{Furthermore}, it does not matter if the
network connection from one endpoint to the other is encrypted or not.


%-----------------------------------------------------------------------------
\section{Task description and objectives}
%-----------------------------------------------------------------------------
\underline{This paper first describes}, VPN networks and Vyatta in general,
including the capabilities offered by this software. {\bf \underline{After} this
brief introduction, the paper will be demonstrate how a virtual private network
server solution can be hosted in a public cloud infrastracture and how such a
solution can be implemented to mitigate security risks.}










