Portland, Oregon
June 12, 2005
June 12, 2005
June 15, 2005
2153-5965
10
10.1006.1 - 10.1006.10
10.18260/1-2--15444
https://peer.asee.org/15444
482
2005-749
Practical Studies of IP Security Virtual Private Network
V. Rajaravivarma Computer Electronics, School of Technology Central Connecticut State University New Britain, CT 06050, USA RajaravivarmaV@ccsu.edu
Abstract This paper addresses the demands of network developers and security administrators to stay up to date with the technological developments in the ever-changing computer network field. This paper seeks to meet the educational need at Central Connecticut State University (CCSU) and adopts innovative laboratory experiences and practices developed in the Information Technology (IT) industry. The targeted audiences are from the ABET accredited programs in Computer Engineering/Technology or Computer Science students in their senior year with a background in (i) Internet; (ii) IP Addressing; (iii) Local Area Network technologies, such as Ethernet; and (iv) Basic router configuration. In the first half of the paper, the key concepts related to Internet Protocol Security (IPSec) and Virtual Private Network (VPN) technologies are discussed in detail. In the second half of the paper, the lab time procedure to setup a VPN test lab at Central Connecticut State University (CCSU) is described. This section also focuses in configuring the VPN Hardware Client and Configuring the VPN Concentrator. Once implemented, this lab can be used for many different purposes and can be very valuable as a troubleshooting and learning aid.
Introduction A Virtual Private Network (VPN) is a secure private network connection that typically uses a public or shared network as its transport. Of course, the most widely known (and common) public network is the Internet. In essence, a VPN connection is a secure “tunnel” between two devices. There are two main components to a VPN connection: the concentrator and the client. 1. The concentrator is typically located in the central hub site of a company, and its function is to terminate the VPN tunnels that are generated from remote devices. As you may have guessed, the concentrator has at least one interface that is reachable over the Internet. 2. The client is the initiator of the VPN tunnel and is typically located at a remote location. The client can be either software or hardware-based. In either case, the client contacts the concentrator (using the publicly accessible Internet interface) to initiate the VPN tunnel. The two parties then negotiate connectivity settings and a
Proceedings of the 2005 American Society for Engineering Education Annual Conference & Exposition Copyright © 2005, American Society for Engineering Education
Rajaravivarma, V. (2005, June), Practical Studies Of Ip Security Virtual Private Network Paper presented at 2005 Annual Conference, Portland, Oregon. 10.18260/1-2--15444
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2005 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015