1
Jan 05, 2016
1
2
FINAL YEAR PROJECT
3
IMPLEMENTATION OF VPN USING IPSEC
4
GROUP MEMBERS
• M.UZAIR NASIR 2K5-CSE-153
• AHSAN EJAZ 2K5-CSE-163
• RANA.M.KAMRAN 2K5-CSE-164
• HUMAYUN KHAN 2K5-CSE-169
5
VPN
• To Create a Secure tunnel over the public network (internet) is called Virtual Private Network
6
VPN Types
• Overlay VPN– Layer 2 VPN
• L2TP
– Layer 3 VPN• IPSec• GRE Tunneling
• Peer-to-Peer VPN– MPLS VPN
7
IPSec VPN
• IPSec is a set of security protocols and algorithms used to secure data at the network layer
8
WHY WE USE IPSEC?
• IP Packets have no inherent security
• No Way To Verify – The claimed sender is a true sender– The data has not been modified in transit– The data has not been viewed by third party
• IP sec Provide Automated Solution for these areas
9
IPSec Security Features
• Data Confidentiality
• Data Integrity
• Data origin Authentication
10
IPSec Protocols
• IPSec uses two main protocols to create a security framework– Encapsulating Security Payload (ESP)– Authentication Header (AH)
11
IPSec VPN
• We can implement IPSec VPN in different Scenario– Site-to-Site VPN– Remote Access VPN
Start
Data security problem
connectivity
Different vpn
Vpn ipsec
Site-to-sitevpn
Remote vpn
End
13
IMPLEMENTATION1st scenario
• PROBLEM
Site1 Site2
DATA
INTERNETINTERNET
HACKER
Data is viewed by third party
DATA
THIS IS A HUGE PROBLEM
14
IMPLEMENTATION1st scenario
• SOLUTIONSite1 Site2
DATA INTERNETINTERNET
HACKER
Third party is unable to view
data
DATA
TUNNELTUNNEL VPN VPN
15
IMPLEMENTATION2ND scenario
• REMOTE VPN Site
LAPTOP (MOBILE USER)
INTERNET
INTERNET
VPN
16
TOOLS
• Routers (security IOS)
• VPN Concentrator
• Sniffer (ethereal)
17
ADVANTAGES
• Cost Effective
• No Additional Equipment Required
• No Distance Limitation
18
ANY QUESTION??
19