VPN Scenarios, Configuration and Analysis : -
DEGEFA, RODOYA TAKELE (2015)
DEGEFA, RODOYA TAKELE
Metropolia Ammattikorkeakoulu
2015
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2015102215633
https://urn.fi/URN:NBN:fi:amk-2015102215633
Tiivistelmä
The goal of this thesis was to create a secure VPN tunnel and a VPN policy for a small LAN and suggest a secure, resilient and robust network setup insight in the vulnerabilities of security, In particular of VPN and provide recommendations to remove or mitigate these vulnerabilities. The thesis aimed not only to provide Site-to-site Connectivity but also to make LAN and its shared resources and services available to a remote worker or workers, offering an integrated, reliable, secured service.
To attain this goal, a network topology was built using a packet tracer and implemented in the school laboratory. During the laboratory work site to site, IPSec remote access and SSL VPN configuration were made to get the results. Cisco configuration professional software and command line interface were both used as a tool. The network connection was successful and secured from end to end for the remote office employees.
No company will be unaffected without the right security protocols. Lack of security policy, configuration and the weakness in technology were found to be the reasons behind system vulnerability. Companies that want to set a local area network with the benefits mentioned in this thesis and implement them in to their security policy will have a strong secured net-work. This security system is monitored, measured and found to be effective in protecting a company’s network system from internal and external attacks and to protect it from loss of resources.
To attain this goal, a network topology was built using a packet tracer and implemented in the school laboratory. During the laboratory work site to site, IPSec remote access and SSL VPN configuration were made to get the results. Cisco configuration professional software and command line interface were both used as a tool. The network connection was successful and secured from end to end for the remote office employees.
No company will be unaffected without the right security protocols. Lack of security policy, configuration and the weakness in technology were found to be the reasons behind system vulnerability. Companies that want to set a local area network with the benefits mentioned in this thesis and implement them in to their security policy will have a strong secured net-work. This security system is monitored, measured and found to be effective in protecting a company’s network system from internal and external attacks and to protect it from loss of resources.