Secure Remote Access IPSEC Virtual Private Network to University Network System

Gajendra Sharma (Department of Computer Science & Engineering,Kathmandu University, Dhulikhel, Kavre)

Abstract


With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.


Keywords


IPSEC, VPN, network, communication, data, encryption, Integrity authentication, remote access, university, security, server, client, peer

Full Text:

PDF

References


Cisco Systems. (2009). CCNA Security Course Booklet Version 1.0. Indianapolis: Cisco Press.

Clayton, N., & Pandya, H. M. (2016). VPN Over IPSEC. In FreeBSD Handbook (p. 742).

Retrieved from https://www.freebsd.org/doc/handbook/ipsec.html

Deal, R. (2005, December 15). Key Exchange. Retrieved from The Complete Cisco VPN Configuration Guide : http://www.fengnet.com/book/vpnconf/ch02lev1sec4.html

Dhall, Batra, & Rani, a. (2012). IMPLEMENTATION OF IPSEC PROTOCOL. 2012 Second

International Conference on Advanced Computing & Communication Technologies

(pp. 176-181). Rohtak: IEEE. doi:10.1109/ACCT.2012.64

Kajal, R., Saini, D., & Grewal, K. (2012, October). Virtual Private Network. International Journal of Advanced Research in Computer Science and Software Engineering, 2(10),

Retrieved from http://www.ijarcsse.com/docs/papers/10_October2012/Volume_2_issue_10_October2 012/V2I900209.pdf

Kang, B., & Balitanas, M. O. (2009). Vulnerabilities of VPN using IPSec and Defensive Measures. International Journal of Advanced Science and Technology, 8, 9-18.

Kim, B.-J., & Srinivasan, S. (2003). Simple Mobility Support for IPsec Tunnel Mode. 3, 1999-2003. doi:10.1109/VETECF.2003.1285375

Lakbabi, A., Orhanou, G., & Hajji, S. E. (2012). VPN IPSEC & SSL Technology. 2012 Next Generation Networks and Services NGNS (pp. 202-208). Agdal: IEEE. doi:10.1109/NGNS.2012.6656108

Lee, H., Nah, J., & Jung, K. (2005). The Remote Access To IPsec-VPN Gateway over. 2005, The 7th International Conference on Advanced Communication Technology (pp. 567- 569). Taejeon: IEEE. doi:10.1109/ICACT.2005.245934.

Maughan, D. (1998, November). Internet Security Association and Key Management Protocol (ISAKMP). Retrieved from https://tools.ietf.org/html/rfc2408

Oliver, P. G. (2013, January 20). Making Sense of Split Tunneling. Retrieved from Infosec ISLAND: http://www.infosecisland.com/blogview/22859-Making-Sense-of-Split- Tunneling-.html

Powell, J. M. (2010). THE IMPACT OF VIRTUAL PRIVATE NETWORK (VPN) ON A

COMPANY'S NETWORK. Retrieved from http://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1056&context=honors

Qu, W., & Srinivas, S. (2002). IPSec-based secure wireless virtual private network. MILCOM 2002. Proceedings, 2002, 2, 1107-1112. doi:10.1109/MILCOM.2002.1179632

Rehman, M. H. (2013). Design and Implementation of Mobility for Virtual Private Network Users. Global Journal of Computer Science and Technology Network, Web & Security, 13(9), 34-39. Retrieved from https://globaljournals.org

Rouse, M. (2010, November). IPsec (Internet Protocol Security). Retrieved from TechTarget: http://searchmidmarketsecurity.techtarget.com/definition/IPsec

Sastry, A. (2011, May). IPSec VPN vs. SSL VPN: Comparing respective VPN security risks. Retrieved from TechTarget: http://searchsecurity.techtarget.com/tip/IPSec-VPN-vs- SSL-VPN-Comparing-respective-VPN-security-risks.

Singh, Y., Chaba, Y., & Rani, P. (2007). Integrating – VPN and IDS – An approach to Networks Security. International Journal of Computer Science and Security, 1(3), 1-

Retrieved from http://www.cscjournals.org/

Ssycxz. (2016, 07 03). Overview of VPN - Evolution of Private Networks. Retrieved from http://ssycxz.kinja.com/overview-of-vpn-evolution-of-private-networks-1763248734

Sun, S. H. (2011). The Advantages and the Implementation of SSL VPN. 2011 IEEE 2nd International Conference on Software Engineering and Service Science (pp. 548- 551). Beijing: IEEE. doi:10.1109/ICSESS.2011.5982375

VelMurugan. (2008, October). What is ISAKMP. Retrieved from http://discuss.itacumens.com/index.php?topic=32692.0



DOI: https://doi.org/10.30564/jcsr.v3i1.2730

Refbacks

  • There are currently no refbacks.
Copyright © 2021 Gajendra Sharma Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.