Design and Deployment of IPSec VPN Using CISCO Network Infrastructure

Authors

  • Sadia Jabbar Anwar  National College of business administration & economics, Bahawalpur, Punjab, Pakistan
  • Ibtehaj Ahmad  Department of Computer Science, Northwestren polytechnical University, Xian, China

DOI:

https://doi.org//10.32628/CSEIT195630

Keywords:

IPSec, Virtual Private Network, Network Security, Small and Medium-Sized Enterprises, Virtual Private Network, Internet Protocol Security

Abstract

Online networks have many threats regarding security. The threats are targeting agency networks, private networks or other networks via gaining access to or changing essential information. Less secure networks deliver authorization to the users to access records in a network. Communication managers need powerful police forces to prevent access, misuse or alteration of secure network information. Small businesses or small businesses use firewalls, antibiotics or anti-spam software to protect the network, but do not provide sufficient network protection. Security in the corporate network is an important part of network protection due to the most common hacker goals. A private network is a reliable way of communicating with various business units and communicating with internal networks. Internet Protocol Security (IPsec) Virtual Private Network (VPN) is one of the most powerful security tools in the field of recording and security options. This is the safest and most secure option available in the Private Network store as a combination of two or more networks in remote areas. The goal of this research is to integrate VPN Services and establish IPsec protocols for small business security. The study is based on the networks of National College of business administration & economics (NCBA&E BWP) and its campuses by using the Cisco routers for a secure and private communication interchange between them. The result shows that IPsec VPN is an appropriate way of communication for Small and Medium-Sized Enterprises (SMEs).

References

  1. Liu D, Miller S, Lucas M, Singh A, Davis J. Firewall policies and VPN configurations. Elsevier; 2006, Sep 28
  2. T. Bayley, B. Rohani, A. Johansson, M. Caldera and H. Zepernick, "Call quality monitoring for VoIP," 2011 5th International Conference on Signal Processing and Communication Systems (ICSPCS), Honolulu, HI, 2011, pp. 1-4.
  3. E. Ramadhan, A. Firdausi and S. Budiyanto, "Design and analysis QoS VoIP using routing Border Gateway Protocol (BGP)," 2017 International Conference on Broadband Communication, Wireless Sensors and Powering (BCWSP), Jakarta, 2017, pp. 1-4
  4. M. A. Ramirez-Reyna, F. A. Cruz-Pérez, S. L. Castellanos-Lopez, G. Hernandez-Valdez and M. E. Rivero-Angeles, "Differentiated Connection Admission Control Strategy for Wireless VoIP Networks with Adaptive Modulation Coding," 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, 2018, pp. 31-37.
  5. J. H. Klink and T. Uhl, "Quality-aware network dimensioning for the VoIP service," 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, 2017, pp. 1-6.
  6. N. Kamat, Ju Wang and J. C. L. Liu, "A delay-efficient rerouting scheme for VoIP traffic," 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698), Baltimore, MD, USA, 2003, pp. III-245.
  7. E. Luchian, R. Terebes and M. Cremene, "Design and implementation of a mobile VoIP system on Android," 2014 11th International Symposium on Electronics and Telecommunications (ISETC), Timisoara, 2014, pp. 1-4.
  8. M. Behdadfar, E. Faghihi and M. E. Sadeghi, "QoS parameters analysis in VoIP network using adaptive quality improvement," 2015 Signal Processing and Intelligent Systems Conference (SPIS), Tehran, 2015, pp. 73-77
  9. N. Brahmbhatt, P. Mann and A. Rawat, "Design and implementation of compatible VoIP," 2017 6th International Conference on Computer Applications In Electrical Engineering-Recent Advances (CERA), Roorkee, 2017, pp. 103-107.
  10. C. Cioponea, M. Bucicoiu and D. Rosner, "Analysis of VoIP encryption performance using dedicated hardware," 2013 11th RoEduNet International Conference, Sinaia, 2013, pp. 1-4.
  11. Feng, Z. Wang, C. Zhang and Y. Fang, "Design and Analysis of a Prioritized Adaptive Multiple Access Scheme for VoIP over WLANs," 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, 2015, pp. 1-6.
  12. R. Dantas, C. Exton and A. Le Gear, "Comparing Network Performance of Mobile VoIP Solutions," 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Bamberg, 2018, pp. 43-50.
  13. Murhammer, M.W., Atakan, O., Badri, Z., Cho, B., Lee, H.J. and Schmid, " A Comprehensive Guide to Virtual Private Networks", Volume III, Cross-Platform Key and Policy Management, 1999.
  14. J. Gupchup, Y. Hosseinkashi, M. Ellis, S. Johnson and R. Cutler, "Analysis of problem tokens to rank factors impacting quality in VoIP applications," 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX), Erfurt, 2017, pp. 1-6.
  15. C. N. Lin, T. L. Lin, T. S. Chen, J. Chen and W. J. Chen, "VoIP communication quality and flow volume preference — A SIP and Red5 example," 2016 3rd International Conference on Systems and Informatics (ICSAI), Shanghai, 2016, pp. 782-786.
  16. A. Lebl, M. Mileusnic, M. Stanic, D. Mitic, V. Matic and Ž. Markov, "Packet interleaving and its influence on the VoIP connection quality," 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS), Nis, 2017, pp. 132-135.
  17. C. Lili, "VoIP System Simulation Design and Implementation," 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, 2012, pp. 296-298.
  18. S.R.Javid, Role of Packet Tracer in learning Computer Networks,‖ International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, 5 May ,2014 no. 5, pp. 6508–6511.
  19. S. Zeadally and F. Siddiqui, "Design and implementation of a SIP-based VoIP architecture," 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004., Fukuoka, Japan, Vol.2, 2004, pp. 187-190 .

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
Sadia Jabbar Anwar, Ibtehaj Ahmad, " Design and Deployment of IPSec VPN Using CISCO Network Infrastructure, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 6, pp.237-247, November-December-2019. Available at doi : https://doi.org/10.32628/CSEIT195630