240 likes | 557 Views
FINAL YEAR PROJECT. IMPLEMENTATION OF VPN USING IPSEC. GROUP MEMBERS. M.UZAIR NASIR 2K5-CSE-153 AHSAN EJAZ 2K5-CSE-163 RANA.M.KAMRAN 2K5-CSE-164 HUMAYUN KHAN 2K5-CSE-169. VPN.
E N D
GROUP MEMBERS • M.UZAIR NASIR 2K5-CSE-153 • AHSAN EJAZ 2K5-CSE-163 • RANA.M.KAMRAN 2K5-CSE-164 • HUMAYUN KHAN 2K5-CSE-169
VPN • To Create a Secure tunnel over the public network (internet) is called Virtual Private Network
VPN Types • Overlay VPN • Layer 2 VPN • L2TP • Layer 3 VPN • IPSec • GRE Tunneling • Peer-to-Peer VPN • MPLS VPN
IPSec VPN • IPSec is a set of security protocols and algorithms used to secure data at the network layer
WHY WE USE IPSEC? • IP Packets have no inherent security • No Way To Verify • The claimed sender is a true sender • The data has not been modified in transit • The data has not been viewed by third party • IP sec Provide AutomatedSolution for these areas
IPSec Security Features • Data Confidentiality • Data Integrity • Data origin Authentication
IPSec Protocols • IPSec uses two main protocols to create a security framework • Encapsulating Security Payload (ESP) • Authentication Header (AH)
IPSec VPN • We can implement IPSec VPN in different Scenario • Site-to-Site VPN • Remote Access VPN
Flow Diagram: Start connectivity Data security problem Different vpn Vpn ipsec Site-to-site vpn Remote vpn End
IMPLEMENTATION1st scenario • PROBLEM Site1 Site2 DATA DATA INTERNET THIS IS A HUGE PROBLEM Data is viewed by third party HACKER
IMPLEMENTATION1st scenario • SOLUTION Site1 Site2 INTERNET DATA DATA VPN TUNNEL Third party is unable to view data HACKER
IMPLEMENTATION2ND scenario • REMOTE VPN Site INTERNET VPN LAPTOP (MOBILE USER)
TOOLS • Routers (security IOS) • VPN Concentrator • Sniffer (ethereal)
ADVANTAGES • Cost Effective • No Additional Equipment Required • No Distance Limitation