Professional Documents
Culture Documents
on
Analysis & Implementation on Virtual Private
Network
A project submitted to the Department of Computer Science and faculty engineering
of the “The People’s University of Bangladesh” in partial fulfillment of requirement
for award of the degree of Bachelor of Science and Computer Science & Engineering.
Supervised By
Md. Masud Reza
Associate Professor
Department of Computer Science & Engineering
The People’s University of Bangladesh
Submitted By
Mithun Paul
ID No: 11225202534
Program: B.Sc in Engineering
Batch: 25th
Department of Computer Science & Engineering
The People’s University of Bangladesh
ii
LETTER OF TRANSMITTAL
Date:
Dear Sir,
I, Mithun Paul, ID No: 11225202534 a regular student of The People’s University of
Bangladesh under the Department of Computer Science & Engineering, pleased to
submit my Project report on Analysis & Implementation on Virtual Private Network
as per the requirement of B.Sc program. It was great and interesting opportunity for
me to obtain some practical experience through this study and know how theoretical
knowledge is applied in the real world.
So, I request you to kindly accept the report and oblige me thereby.
Sincerely yours,
____________________
Mithun Paul
ID No: 11225202534
Program: B.Sc in Engineering
Batch: 25th
Department of Computer Science & Engineering
The People’s University of Bangladesh
iii
Student’s Declaration
I am Mithun Paul, ID No: 11225202534 student of Bachelor of Science in Computer
Science & Engineering hereby solemnly declare that the works presented in this
project has been carried out by me and have not previously been submitted to any
other university/college/organization for any academic qualification /certificate
/diploma/degree.
I guarantee that the present work does not breach any copyright.
____________________
Mithun Paul
ID No: 11225202534
Program: B.Sc in Engineering
Batch: 25th
Department of Computer Science & Engineering
The People’s University of Bangladesh
iv
CERTIFICATE OF THE SUPERVISOR
I hereby certify that the Project report on “Analysis & Implementation on Virtual
Private Network” is a confide record of project work done by Mithun Paul, ID No:
11225202534 for partial fulfillment of the requirements for The People’s University
of Bangladesh.
The project report has been carried out under my guidance and is a record of the bona-
fide work carried out successfully by the student.
Supervisor
v
Acknowledgement
First and foremost, we would like to thank to my supervisor of this project, Md.
Masud Reza, Associate Professor, Department of Computer Science & Engineering,
The People’s University of Bangladesh his valuable guidance and advice. He inspired
us greatly to work in this project. His willingness to motivate us contributed
tremendously to my project. I also would like to thanks him for showing us some
example that related to the topic of our project.
Finally, an honorable mention goes to our families and friends for their
understandings and supports on us in Virtual Private Network project. Without helps
of the particular that mentioned above, we would face many difficulties while doing
this project.
vi
Abstract
Now a day Virtual Private Network (VPN) becomes most common term for the IT
professional in the field of networking. By using it the communication in the Internet
can be protected by encryption. It provides a secure area for business and commercial
information exchange. Virtual Private Network (VPN) also ensures integrity by
checksum values, which reveals any attempt of modifying original data during the
communication. In this technology identity of the two ends will be confirmed by
authentication, which makes sure that both side of the communication will be
identified before the communication begins. This project implements a Virtual Private
Network for a corporation which can be used for any organization.
vii
Table of Contents
Chapter-01
Introduction
1.1 Overview -----------------------------------------------------------------------------------------1
1.2 Motivation --------------------------------------------------------------------------------------- 1
1.3 Objective----------------------------------------------------------------------------------------- 2
1.4 Method------------------------------------------------------------------------------------------- 2
Chapter-02
VPN History
2.1 Overview----------------------------------------------------------------------------------------- 3
2.2 Advantage of VPN------------------------------------------------------------------------------ 7
2.3 Tunneling and Labeling protocol ------------------------------------------------------------ 8
2.4 Layer Two Tunneling -------------------------------------------------------------------------- 9
2.5 IP in IP tunneling------------------------------------------------------------------------------ 12
2.6 GRE protocol----------------------------------------------------------------------------------- 13
2.7 IP sec-------------------------------------------------------------------------------------------- 14
Chapter-03
Proposed Model
3.1 Proposed Topology---------------------------------------------------------------------------- 18
3.2 VPN Design ------------------------------------------------------------------------------------19
3.3 Working process----------------------------------------------------------------------------- 20
Chapter-04
Security
4.1 Encryption---------------------------------------------------------------------------------------23
4.2 Cisco’s Implementation of Network Data Encryption with Router Authentication
---------------------------------------------------------------------------------------------------------24
4.3 Various Algorithms----------------------------------------------------------------------------26
4.4 3DES Encryption Algorithms----------------------------------------------------------------27
4.4.1 Algorithm-------------------------------------------------------------------------------------28
viii
4.4.2 Keys--------------------------------------------------------------------------------------------29
4.4.3 3DESe Configuration Option For ECP---------------------------------------------------29
4.4.4 Padding----------------------------------------------------------------------------------------30
4.4.5 Packet Format For 3dese------------------------------------------------------------------31
4.5 MD5 Algorithms-------------------------------------------------------------------------------32
4.5.1Configuration of Md5 Encryption on Clear Text
Password---------------------------- 33
4.5.2 MD5 Encrypted Texts Password ----------------------------------------------------------33
4.5.3. To Verity the Logins With MD5 Encryption, Clear Text Password-----------------33
4.5.4 MD5 Encrypted Text Entered as Password ---------------------------------------------34
4.6 Security Considerations -----------------------------------------------------------------------35
Chapter 05
Analysis
5.1 Overview----------------------------------------------------------------------------------------36
5.2 Virtual Private Networks ---------------------------------------------------------------------36
5.3 Application-Proxy ----------------------------------------------------------------------------37
5.4 Filter----------------------------------------------------------------------------------------------38
5.5 Plug in-------------------------------------------------------------------------------------------38
5.6 Built-In to the Software-----------------------------------------------------------------------39
Chapter 06
Conclusion------------------------------------------------------------------------------------------40
References-------------------------------------------------------------------------------------------41
ix
List of Figures
Figure 2.4 LAN with router and firewall to control external access 7
Figure 2.8 IP Sec tunnel mode and transport mode with ESP and AH. 14
Figure 4.3 Address and Control Field Compression option (ACFC) of 3DESE 31