Asee peer logo

Practical Studies Of Ip Security Virtual Private Network

Download Paper |


2005 Annual Conference


Portland, Oregon

Publication Date

June 12, 2005

Start Date

June 12, 2005

End Date

June 15, 2005



Conference Session

Curriculum Development in Computer/Communications ET

Page Count


Page Numbers

10.1006.1 - 10.1006.10



Permanent URL

Download Count


Request a correction

Paper Authors

author page

Veeramuthu Rajaravivarma

Download Paper |

NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract


Practical Studies of IP Security Virtual Private Network

V. Rajaravivarma Computer Electronics, School of Technology Central Connecticut State University New Britain, CT 06050, USA

Abstract This paper addresses the demands of network developers and security administrators to stay up to date with the technological developments in the ever-changing computer network field. This paper seeks to meet the educational need at Central Connecticut State University (CCSU) and adopts innovative laboratory experiences and practices developed in the Information Technology (IT) industry. The targeted audiences are from the ABET accredited programs in Computer Engineering/Technology or Computer Science students in their senior year with a background in (i) Internet; (ii) IP Addressing; (iii) Local Area Network technologies, such as Ethernet; and (iv) Basic router configuration. In the first half of the paper, the key concepts related to Internet Protocol Security (IPSec) and Virtual Private Network (VPN) technologies are discussed in detail. In the second half of the paper, the lab time procedure to setup a VPN test lab at Central Connecticut State University (CCSU) is described. This section also focuses in configuring the VPN Hardware Client and Configuring the VPN Concentrator. Once implemented, this lab can be used for many different purposes and can be very valuable as a troubleshooting and learning aid.

Introduction A Virtual Private Network (VPN) is a secure private network connection that typically uses a public or shared network as its transport. Of course, the most widely known (and common) public network is the Internet. In essence, a VPN connection is a secure “tunnel” between two devices. There are two main components to a VPN connection: the concentrator and the client. 1. The concentrator is typically located in the central hub site of a company, and its function is to terminate the VPN tunnels that are generated from remote devices. As you may have guessed, the concentrator has at least one interface that is reachable over the Internet. 2. The client is the initiator of the VPN tunnel and is typically located at a remote location. The client can be either software or hardware-based. In either case, the client contacts the concentrator (using the publicly accessible Internet interface) to initiate the VPN tunnel. The two parties then negotiate connectivity settings and a

Proceedings of the 2005 American Society for Engineering Education Annual Conference & Exposition Copyright © 2005, American Society for Engineering Education

Rajaravivarma, V. (2005, June), Practical Studies Of Ip Security Virtual Private Network Paper presented at 2005 Annual Conference, Portland, Oregon. 10.18260/1-2--15444

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2005 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015