Professional Documents
Culture Documents
CCN Practical No.8
CCN Practical No.8
Theory:
Introduction to VPN for information security
Users can establish a private, encrypted connection to the internet using VPN
technology. Sensitive data is shielded from hackers and thieves thanks to its
high level of privacy and security. Users can also get around geo-restrictions and
access content that might be blocked in their area. Anyone who wishes to
increase their online privacy and security should consider using a VPN.
Interpretation:
● VPN is implemented using the IPsec protocol on the router.
● VPN allowed PC0 and PC1 to bypass using t h e tunnel o f the ISP
router while communicating with each other.
Write Procedure for demonstration of VPN:
Interpretation:
● Firewall is implemented using Cisco ASA for TCP and ICMP protocols.
● Firewall allows client PCs to connect to the internet securely
Conclusion:
The experiment demonstrated how Cisco Packet Tracer can be used to simulate a
network environment and test different configurations before implementing them in
a real-world setting.
The experiment demonstrated the importance of network security and how VPNs
and firewalls can be used to secure a network.
The experiment also demonstrated how Cisco Packet Tracer can be used to simulate
a network environment and test different configurations before implementing them
in a real-world setting.
Overall, the experiment provided a valuable learning experience in network security,
and the skills gained can be applied in a variety of settings to ensure the security of
network infrastructure.