Secure Remote Access IPSEC Virtual Private Network to University Network System

Gajendra Sharma (Department of Computer Science & Engineering,Kathmandu University, Dhulikhel, Kavre)


With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.


IPSEC, VPN, network, communication, data, encryption, Integrity authentication, remote access, university, security, server, client, peer

Full Text:



Cisco Systems. (2009). CCNA Security Course Booklet Version 1.0. Indianapolis: Cisco Press.

Clayton, N., & Pandya, H. M. (2016). VPN Over IPSEC. In FreeBSD Handbook (p. 742).

Retrieved from

Deal, R. (2005, December 15). Key Exchange. Retrieved from The Complete Cisco VPN Configuration Guide :

Dhall, Batra, & Rani, a. (2012). IMPLEMENTATION OF IPSEC PROTOCOL. 2012 Second

International Conference on Advanced Computing & Communication Technologies

(pp. 176-181). Rohtak: IEEE. doi:10.1109/ACCT.2012.64

Kajal, R., Saini, D., & Grewal, K. (2012, October). Virtual Private Network. International Journal of Advanced Research in Computer Science and Software Engineering, 2(10),

Retrieved from 012/V2I900209.pdf

Kang, B., & Balitanas, M. O. (2009). Vulnerabilities of VPN using IPSec and Defensive Measures. International Journal of Advanced Science and Technology, 8, 9-18.

Kim, B.-J., & Srinivasan, S. (2003). Simple Mobility Support for IPsec Tunnel Mode. 3, 1999-2003. doi:10.1109/VETECF.2003.1285375

Lakbabi, A., Orhanou, G., & Hajji, S. E. (2012). VPN IPSEC & SSL Technology. 2012 Next Generation Networks and Services NGNS (pp. 202-208). Agdal: IEEE. doi:10.1109/NGNS.2012.6656108

Lee, H., Nah, J., & Jung, K. (2005). The Remote Access To IPsec-VPN Gateway over. 2005, The 7th International Conference on Advanced Communication Technology (pp. 567- 569). Taejeon: IEEE. doi:10.1109/ICACT.2005.245934.

Maughan, D. (1998, November). Internet Security Association and Key Management Protocol (ISAKMP). Retrieved from

Oliver, P. G. (2013, January 20). Making Sense of Split Tunneling. Retrieved from Infosec ISLAND: Tunneling-.html


COMPANY'S NETWORK. Retrieved from

Qu, W., & Srinivas, S. (2002). IPSec-based secure wireless virtual private network. MILCOM 2002. Proceedings, 2002, 2, 1107-1112. doi:10.1109/MILCOM.2002.1179632

Rehman, M. H. (2013). Design and Implementation of Mobility for Virtual Private Network Users. Global Journal of Computer Science and Technology Network, Web & Security, 13(9), 34-39. Retrieved from

Rouse, M. (2010, November). IPsec (Internet Protocol Security). Retrieved from TechTarget:

Sastry, A. (2011, May). IPSec VPN vs. SSL VPN: Comparing respective VPN security risks. Retrieved from TechTarget: SSL-VPN-Comparing-respective-VPN-security-risks.

Singh, Y., Chaba, Y., & Rani, P. (2007). Integrating – VPN and IDS – An approach to Networks Security. International Journal of Computer Science and Security, 1(3), 1-

Retrieved from

Ssycxz. (2016, 07 03). Overview of VPN - Evolution of Private Networks. Retrieved from

Sun, S. H. (2011). The Advantages and the Implementation of SSL VPN. 2011 IEEE 2nd International Conference on Software Engineering and Service Science (pp. 548- 551). Beijing: IEEE. doi:10.1109/ICSESS.2011.5982375

VelMurugan. (2008, October). What is ISAKMP. Retrieved from



  • There are currently no refbacks.
Copyright © 2021 Gajendra Sharma Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.