The Solution and Management of VPN Based IPSec Technology

2014 ◽  
Vol 686 ◽  
pp. 210-219
Author(s):  
Guo Fang Zhang

The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.

2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


Author(s):  
Samuel Ndichu ◽  
◽  
Sylvester McOyowo ◽  
Henry Okoyo ◽  
Cyrus Wekesa

Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or resources being accessed. These threats differ depending on the type of device used to procure remote access. One kind of these remote access devices can be considered as safe as the organization probably issues it to provide for remote access. The other type is risky and unsafe, as they are beyond the organization’s control and monitoring. The myriad of devices is, however, a necessary evil, be it employees on public networks like cyber cafes, wireless networks, vendors support, or telecommuting. Virtual Private Network (VPN) securely connects a remote user or device to an internal or private network using the internet and other public networks. However, this conventional remote access security approach has several vulnerabilities, which can take advantage of encryption. The significant threats are malware, botnets, and Distributed Denial of Service (DDoS). Because of the nature of a VPN, encryption will prevent traditional security devices such as a firewall, Intrusion Detection System (IDS), and antivirus software from detecting compromised traffic. These vulnerabilities have been exploited over time by attackers using evasive techniques to avoid detection leading to costly security breaches and compromises. We highlight numerous shortcomings for several conventional approaches to remote access security. We then adopt network tiers to facilitate vulnerability management (VM) in remote access domains. We perform regular traffic simulation using Network Security Simulator (NeSSi2) to set bandwidth baseline and use this as a benchmark to investigate malware spreading capabilities and DDoS attacks by continuous flooding in remote access. Finally, we propose a novel approach to remote access security by passive learning of packet capture file features using machine learning and classification using a classifier model.


2019 ◽  
Vol 22 (4) ◽  
pp. 283-293
Author(s):  
Subhi Aswad Mohammed

This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON   simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response


2013 ◽  
Vol 427-429 ◽  
pp. 2783-2786
Author(s):  
Lian Fen Huang ◽  
Hang Liu

With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.


2014 ◽  
Vol 610 ◽  
pp. 741-746
Author(s):  
Zuo Zhi Shao ◽  
Jun Feng Qiao ◽  
Hao Li ◽  
Yun Peng Li

While the rapid development of Internet technology and communication technology, SSL VPN (security socket Layer Virtual Private Network) as a new remote access technology about network application layer, not only based on the proven SSL protocol, but meet the needs of most of network users. In recent years, enterprise networks have been widely used. However, due to its structure so that all access and calculation must be processed through VPN service, which appeared insufficient memory, computing speed to keep up with other issues. This article proposed some improvement based on these issues, using the improved algorithm to encrypt the ellipse. Keywords-SSL;VPN;Ellipsealgorithm


2013 ◽  
Vol 9 (1) ◽  
Author(s):  
Robby Triadi Susanto ◽  
Gani Indriyanta ◽  
R. Gunawan Santosa

Virtual Private Network (VPN) is a technology implemented as a solution to connect head and branch offices through a network. VPN enables all offices connected to be treated as a single broadcast domain or a single network, providing a private connection. VPN can be implemented over several protocols: Point-To-Point Tunneling Protocol (PPTP) and Ethernet over Internet Protocol (EoIP). This research conducted through implementation of both protocols on a site-to site VPN and measuring each protocol’s performance using throughput, packet loss and delay parameters obtained from real topology. Overall result shows that EoIP performs better than PPTP. Within six days of observation, obtained data shows that EoIP has better throughput and less delay than PPTP, while PPTP has a smaller rate of packet loss than EoIP.


Author(s):  
Madhusanka Liyanage ◽  
Mika Ylianttila ◽  
Andrei Gurtov

Virtual Private Network (VPN) services are widely used in the present corporate world to securely interconnect geographically distributed private network segments through unsecure public networks. Among various VPN techniques, Internet Protocol (IP)-based VPN services are dominating due to the ubiquitous use of IP-based provider networks and the Internet. Over last few decades, the usage of cellular/mobile networks has increased enormously due to the rapid increment of the number of mobile subscribers and the evolvement of telecommunication technologies. Furthermore, cellular network-based broadband services are able to provide the same set of network services as wired Internet services. Thus, mobile broadband services are also becoming popular among corporate customers. Hence, the usage of mobile broadband services in corporate networks demands to implement various broadband services on top of mobile networks, including VPN services. On the other hand, the all- IP-based mobile network architecture, which is proposed for beyond-LTE (Long Term Evolution) networks, is fuel to adapt IP-based VPN services in to cellular networks. This chapter is focused on identifying high-level use cases and scenarios where IP-based VPN services can be implemented on top of cellular networks. Furthermore, the authors predict the future involvement of IP-based VPNs in beyond-LTE cellular networks.


2014 ◽  
Vol 984-985 ◽  
pp. 1269-1275
Author(s):  
D.S. Dayana

Users interested to use the Internet from anywhere and at any time. For this purpose, the Internet Engineering Task Force proposed the concept of network mobility. But the IETF’s mobile Virtual Private Network does not support for real time applications. In this paper, the user’s communication between public networks and the private networks can be secured by using Virtual Private Network gateway. This secured user’s communication is based on Session Initiation Protocol and AES algorithm. The security impact is computed analytically and the performance is simulated. The signaling cost can also be reduced in this approach. Cryptographic mechanism like encryption and decryption is applied through the AES algorithm, so that the data transmitted through the VPN gateway is quality and secured.


2019 ◽  
Vol 7 (1) ◽  
Author(s):  
Fahlepi Roma Doni

Abstract - With the advancement of the development of the times, then the technology also develops, especially the application technology that shows rapid progress, ifrastruktur field of communication that can support for the creation of systems or applications that are reliable also experienced rapid development. The technology used so that we can control a computer from a different network place or region by using a hamachi VPN (Virtual Private Network) application, using this application then we are as if it will be in one computer network and we can control the computer from other places , the coverage that we can access is not limited to regions, different places, islands, countries and even different continents can be interconnected. The development of different computer technology area every day is also growing and the coverage is wider, not only in one coverage area only, even can become global coverage (the world), that is using internet, with this internet facility, hence to use computer network from Different areas of places can be affordable with hamachi VPN applications can even reach a large area.Keywords: Information technology, Hamachi VPN, InternetAbstrak - Dengan semakin majunya berkembangan zaman, maka teknologi ikut berkembang juga, khususnya teknologi aplikasi yang menunjukkan kemajuan yang sangat pesat, ifrastruktur dibidang komunikasi yang bisa mendukung untuk terciptanya sistem atau aplikasi yang handal ikut mengalami perkembangan pesat juga. Teknologi yang digunakan supaya kita bisa mengendalikan komputer dari jaringan yang berbeda tempat atau wilayah dengan menggunakan sebuah aplikasi hamachi VPN (Virtual Private Network), dengan menggunakan aplikasi ini maka kita seolah-olah akan berada dalan satu jaringan komputer dan kita bisa mengendalikan komputer dari tempat lain, cakupan yang dapat kita akses itu tidak terbatas wilayah, berbeda tempat, pulau, negara bahkan yang berbeda benua bisa saling terkoneksi. Perkembangan teknologi jaringan komputer yang berbeda area setiap harinya juga semakin berkembang dan cakupan semakin luas, tidak hanya dalam satu cakupan area saja, bahkan bisa menjadi cakupan global (dunia), yakni menggunakan internet, dengan adanya fasilitas internet ini, maka untuk menggunakan jaringan komputer dari area yang berbeda tempat bisa terjangkau dengan aplikasi hamachi VPN bahkan bisa menjangkau wilayah yang luas.Kata kunci : Teknologi informasi, Hamachi VPN, Internet 


Sign in / Sign up

Export Citation Format

Share Document