FINAL YEAR PROJECT
IMPLEMENTATION OF VPN USING IPSEC
GROUP MEMBERS M.UZAIR NASIR 2K5-CSE-153 AHSAN EJAZ 2K5-CSE-163 RANA.M.KAMRAN 2K5-CSE-164 HUMAYUN KHAN 2K5-CSE-169
VPN To Create a Secure tunnel over the public network (internet) is called Virtual Private Network
VPN Types Overlay VPN Peer-to-Peer VPN Layer 2 VPN Layer 3 VPN L2TP Layer 3 VPN IPSec GRE Tunneling Peer-to-Peer VPN MPLS VPN
IPSec VPN IPSec is a set of security protocols and algorithms used to secure data at the network layer
WHY WE USE IPSEC? IP Packets have no inherent security No Way To Verify The claimed sender is a true sender The data has not been modified in transit The data has not been viewed by third party IP sec Provide Automated Solution for these areas
IPSec Security Features Data Confidentiality Data Integrity Data origin Authentication
IPSec Protocols IPSec uses two main protocols to create a security framework Encapsulating Security Payload (ESP) Authentication Header (AH)
IPSec VPN We can implement IPSec VPN in different Scenario Site-to-Site VPN Remote Access VPN
Flow Diagram: Start connectivity Data security problem Different vpn Vpn ipsec Site-to-site vpn Remote vpn End
IMPLEMENTATION 1st scenario PROBLEM Site1 Site2 DATA DATA INTERNET THIS IS A HUGE PROBLEM Data is viewed by third party HACKER
IMPLEMENTATION 1st scenario SOLUTION Site1 Site2 INTERNET DATA DATA VPN TUNNEL Third party is unable to view data HACKER
IMPLEMENTATION 2ND scenario REMOTE VPN Site INTERNET VPN LAPTOP (MOBILE USER)
TOOLS Routers (security IOS) VPN Concentrator Sniffer (ethereal)
ADVANTAGES Cost Effective No Additional Equipment Required No Distance Limitation
ANY QUESTION??