1 / 19

FINAL YEAR PROJECT

FINAL YEAR PROJECT. IMPLEMENTATION OF VPN USING IPSEC. GROUP MEMBERS. M.UZAIR NASIR 2K5-CSE-153 AHSAN EJAZ 2K5-CSE-163 RANA.M.KAMRAN 2K5-CSE-164 HUMAYUN KHAN 2K5-CSE-169. VPN.

barry-colon
Download Presentation

FINAL YEAR PROJECT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FINAL YEAR PROJECT

  2. IMPLEMENTATION OF VPN USING IPSEC

  3. GROUP MEMBERS • M.UZAIR NASIR 2K5-CSE-153 • AHSAN EJAZ 2K5-CSE-163 • RANA.M.KAMRAN 2K5-CSE-164 • HUMAYUN KHAN 2K5-CSE-169

  4. VPN • To Create a Secure tunnel over the public network (internet) is called Virtual Private Network

  5. VPN Types • Overlay VPN • Layer 2 VPN • L2TP • Layer 3 VPN • IPSec • GRE Tunneling • Peer-to-Peer VPN • MPLS VPN

  6. IPSec VPN • IPSec is a set of security protocols and algorithms used to secure data at the network layer

  7. WHY WE USE IPSEC? • IP Packets have no inherent security • No Way To Verify • The claimed sender is a true sender • The data has not been modified in transit • The data has not been viewed by third party • IP sec Provide AutomatedSolution for these areas

  8. IPSec Security Features • Data Confidentiality • Data Integrity • Data origin Authentication

  9. IPSec Protocols • IPSec uses two main protocols to create a security framework • Encapsulating Security Payload (ESP) • Authentication Header (AH)

  10. IPSec VPN • We can implement IPSec VPN in different Scenario • Site-to-Site VPN • Remote Access VPN

  11. Flow Diagram: Start connectivity Data security problem Different vpn Vpn ipsec Site-to-site vpn Remote vpn End

  12. IMPLEMENTATION1st scenario • PROBLEM Site1 Site2 DATA DATA INTERNET THIS IS A HUGE PROBLEM Data is viewed by third party HACKER

  13. IMPLEMENTATION1st scenario • SOLUTION Site1 Site2 INTERNET DATA DATA VPN TUNNEL Third party is unable to view data HACKER

  14. IMPLEMENTATION2ND scenario • REMOTE VPN Site INTERNET VPN LAPTOP (MOBILE USER)

  15. TOOLS • Routers (security IOS) • VPN Concentrator • Sniffer (ethereal)

  16. ADVANTAGES • Cost Effective • No Additional Equipment Required • No Distance Limitation

  17. ANY QUESTION??

More Related