Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 5 , 2022
Design and Implementation of secure communication between Two Branches of a company using IPSec protocol In CLI and GUI modes

Author : S. Sri Priya 1 M.Vijaya Bhaskar Reddy 2 G. Sagar Reddy 3 G.Guru Prasad 4 M.Lakshmi Narayana Reddy 5 B.Neelima 6

Date of Publication :7th March 2016

Abstract: Now a day’s most of the corporate business network infrastructure needs to securely transfer data across the Internet. Data can be a company’s top-secret information regarding product designs, product release dates, patent information, HR employee investigations, etc. This project provides insight for a secure solution to this business need using Virtual Private Network (VPN). There are a number of VPN protocols in use that secure the transport of data traffic over a public network infrastructure. Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session[1]. IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to host). A virtual private network (VPN) is a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that are inaccessible. A VPN provides security so that traffic sent through the VPN connection stays isolated from other computers on the intermediate network. VPNs can connect individual users to a remote network or connect multiple networks together. For example, a user may use a VPN to connect to their work computer terminal from home and access their email, files, images, etc. Corporate migration to VPN connections across the Internet is beginning to become very attractive because of the tremendous cost savings. VPN remote users get the impression of being directly connected to the central network via a point-to-point link[1].

Reference :

    1. Munasinghe K. S. and Shahrestani S. A., “Evaluation of an IPSec VPN over a Wireless Infrastructure,” in Proceedings of The Australian Telecommunication Networks and Applications Conference (ATNAC 2004), pp. 315-320, December 2004a
    2. TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series) 2nd Edition
    3. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference 1st Edition
    4. Cisco TCP/IP Routing Professional Reference 3rd Edition
    5. Routing Protocols Companion Guide Kindle Edition By Cisco Networking Academy.

Recent Article