You are on page 1of 9

A Project Report

on
Analysis & Implementation on Virtual Private
Network
A project submitted to the Department of Computer Science and faculty engineering
of the “The People’s University of Bangladesh” in partial fulfillment of requirement
for award of the degree of Bachelor of Science and Computer Science & Engineering.

Supervised By
Md. Masud Reza
Associate Professor
Department of Computer Science & Engineering
The People’s University of Bangladesh

Submitted By
Mithun Paul
ID No: 11225202534
Program: B.Sc in Engineering
Batch: 25th
Department of Computer Science & Engineering
The People’s University of Bangladesh

THE PEOPLE’S UNIVERSITY OF BANGLADESH

ii
LETTER OF TRANSMITTAL

Date:

Md. Masud Reza


Associate Professor
Department of Computer Science & Engineering
The People’s University of Bangladesh

Subject: Submission of Project report

Dear Sir,
I, Mithun Paul, ID No: 11225202534 a regular student of The People’s University of
Bangladesh under the Department of Computer Science & Engineering, pleased to
submit my Project report on Analysis & Implementation on Virtual Private Network
as per the requirement of B.Sc program. It was great and interesting opportunity for
me to obtain some practical experience through this study and know how theoretical
knowledge is applied in the real world.

So, I request you to kindly accept the report and oblige me thereby.

Sincerely yours,

____________________
Mithun Paul
ID No: 11225202534
Program: B.Sc in Engineering
Batch: 25th
Department of Computer Science & Engineering
The People’s University of Bangladesh

iii
Student’s Declaration
I am Mithun Paul, ID No: 11225202534 student of Bachelor of Science in Computer
Science & Engineering hereby solemnly declare that the works presented in this
project has been carried out by me and have not previously been submitted to any
other university/college/organization for any academic qualification /certificate
/diploma/degree.

I guarantee that the present work does not breach any copyright.

____________________
Mithun Paul
ID No: 11225202534
Program: B.Sc in Engineering
Batch: 25th
Department of Computer Science & Engineering
The People’s University of Bangladesh

iv
CERTIFICATE OF THE SUPERVISOR

I hereby certify that the Project report on “Analysis & Implementation on Virtual
Private Network” is a confide record of project work done by Mithun Paul, ID No:
11225202534 for partial fulfillment of the requirements for The People’s University
of Bangladesh.

The project report has been carried out under my guidance and is a record of the bona-
fide work carried out successfully by the student.

Supervisor

Md. Masud Reza


Associate Professor
Department of Computer Science & Engineering
The People’s University of Bangladesh

v
Acknowledgement

First and foremost, we would like to thank to my supervisor of this project, Md.
Masud Reza, Associate Professor, Department of Computer Science & Engineering,
The People’s University of Bangladesh his valuable guidance and advice. He inspired
us greatly to work in this project. His willingness to motivate us contributed
tremendously to my project. I also would like to thanks him for showing us some
example that related to the topic of our project.

Besides, we would like to thank the authority of The People’s University of


Bangladesh for providing us with a good environment and facilities to complete this
project. Also, I would like to take this opportunity to thank to the department of
Computer Science and Engineering of The People’s University of Bangladesh for
offering this subject Computer Lab setup using Virtual Private Network (VPN)
project. Its gives us an opportunity to learn about the VPN based project.

Finally, an honorable mention goes to our families and friends for their
understandings and supports on us in Virtual Private Network project. Without helps
of the particular that mentioned above, we would face many difficulties while doing
this project.

vi
Abstract

Now a day Virtual Private Network (VPN) becomes most common term for the IT
professional in the field of networking. By using it the communication in the Internet
can be protected by encryption. It provides a secure area for business and commercial
information exchange. Virtual Private Network (VPN) also ensures integrity by
checksum values, which reveals any attempt of modifying original data during the
communication. In this technology identity of the two ends will be confirmed by
authentication, which makes sure that both side of the communication will be
identified before the communication begins. This project implements a Virtual Private
Network for a corporation which can be used for any organization.

vii
Table of Contents

Chapter-01
Introduction
1.1 Overview -----------------------------------------------------------------------------------------1
1.2 Motivation --------------------------------------------------------------------------------------- 1
1.3 Objective----------------------------------------------------------------------------------------- 2
1.4 Method------------------------------------------------------------------------------------------- 2

Chapter-02
VPN History
2.1 Overview----------------------------------------------------------------------------------------- 3
2.2 Advantage of VPN------------------------------------------------------------------------------ 7
2.3 Tunneling and Labeling protocol ------------------------------------------------------------ 8
2.4 Layer Two Tunneling -------------------------------------------------------------------------- 9
2.5 IP in IP tunneling------------------------------------------------------------------------------ 12
2.6 GRE protocol----------------------------------------------------------------------------------- 13
2.7 IP sec-------------------------------------------------------------------------------------------- 14

Chapter-03
Proposed Model
3.1 Proposed Topology---------------------------------------------------------------------------- 18
3.2 VPN Design ------------------------------------------------------------------------------------19
3.3 Working process----------------------------------------------------------------------------- 20

Chapter-04
Security
4.1 Encryption---------------------------------------------------------------------------------------23
4.2 Cisco’s Implementation of Network Data Encryption with Router Authentication
---------------------------------------------------------------------------------------------------------24
4.3 Various Algorithms----------------------------------------------------------------------------26
4.4 3DES Encryption Algorithms----------------------------------------------------------------27
4.4.1 Algorithm-------------------------------------------------------------------------------------28

viii
4.4.2 Keys--------------------------------------------------------------------------------------------29
4.4.3 3DESe Configuration Option For ECP---------------------------------------------------29
4.4.4 Padding----------------------------------------------------------------------------------------30
4.4.5 Packet Format For 3dese------------------------------------------------------------------31
4.5 MD5 Algorithms-------------------------------------------------------------------------------32
4.5.1Configuration of Md5 Encryption on Clear Text
Password---------------------------- 33
4.5.2 MD5 Encrypted Texts Password ----------------------------------------------------------33
4.5.3. To Verity the Logins With MD5 Encryption, Clear Text Password-----------------33
4.5.4 MD5 Encrypted Text Entered as Password ---------------------------------------------34
4.6 Security Considerations -----------------------------------------------------------------------35

Chapter 05
Analysis
5.1 Overview----------------------------------------------------------------------------------------36
5.2 Virtual Private Networks ---------------------------------------------------------------------36
5.3 Application-Proxy ----------------------------------------------------------------------------37
5.4 Filter----------------------------------------------------------------------------------------------38
5.5 Plug in-------------------------------------------------------------------------------------------38
5.6 Built-In to the Software-----------------------------------------------------------------------39

Chapter 06
Conclusion------------------------------------------------------------------------------------------40

References-------------------------------------------------------------------------------------------41

ix
List of Figures

Figure 2.1 Network with two router 5

Figure 2.2 Early LAN with 4 workstations and a hub 5

Figure 2.3 Typical LAN with router for internet access 6

Figure 2.4 LAN with router and firewall to control external access 7

Figure 2.5 L2TP Tunnel 9

Figure 2.6 The L2TP message header 10

Figure 2.7 The minimal encapsulation for IP 12

Figure 2.8 IP Sec tunnel mode and transport mode with ESP and AH. 14

Figure 2.9 Illustrates the Model with Network 17

Figure 3.1 Remote VPN and Site to Site VPN topology 19

Figure 4.1 Algorithm of Tripe-DES 28

Figure 4.2 ECP 3DESE Configuration Option 29

Figure 4.3 Address and Control Field Compression option (ACFC) of 3DESE 31

You might also like