Professional Documents
Culture Documents
Ccs354-Network Security Laboratory
Ccs354-Network Security Laboratory
CCS354-NETWORK SECURITY
YEAR: 2023 – 2024 [ODD SEM]
REGISTER NUMBER :
YEAR : III
SEMESTER : V
AGNI COLLEGE OF TECHNOLOGY
(Approved by AICTE & Affiliated to AnnaUniversity)
Old Mahabalipuram Road, Thalambur, Chennai –600 130
REGISTER NUMBER:
Certified that this is the Bonafide Record of work done by Mr. / Ms.
Aim:
To write a Python program to implement the Symmetric key algorithms,
Algorithms:
Program:
def generate_key():
return get_random_bytes(16) # AES-128 requires a 16-byte key
# Example usage:
secret_key = generate_key()
message = "Hello, symmetric encryption!"
encrypted_message = encrypt(message, secret_key)
print("Encrypted:", encrypted_message)
Output:
Encrypted:
b'\x8d\xf3S\x85\xc0\xc4#\xd2\xa6O\xbc\x08D\xc6m\xed\xabQ&\x03\xf5C5\xf4\xe8\x95\xd9r\
xbd\xf5K'
Decrypted:
Hello, symmetric encryption!
Result:
The python program for the symmetric key algorithm was implemented and executed successfully.
ExNo:2 Implement the Asymmetric key algorithms and key exchange algorithms
Aim:
To write a Python program to implement the Asymmetric key algorithms and key exchange algorithms.
Algorithms:
Key generation:
1. Select random prime numbers p and q, and check that p! =q
2. Compute modulus n=pq
3. Compute phi, ¢=(p-1)(q-1)
4. Select public exponente,1< e<¢. Such that gcd(e,¢)= 1
5. Compute private exponent d=e-1mod¢
6. Publickey is{n,e},private key is d
Encryption&Decryption
1.Encryption:c=memodn,
2.Decryption:m=cdmodn
3.Displaytheciphertextandplaintext.
Program:
# Encryption def
encrypt_asymmetric(plain_text, public_key):
key = RSA.import_key(public_key) cipher =
PKCS1_OAEP.new(key)
encrypted_text = cipher.encrypt(plain_text.encode('utf-8'))
return encrypted_text
# Decryption def
decrypt_asymmetric(cipher_text, private_key):
key = RSA.import_key(private_key) cipher =
PKCS1_OAEP.new(key)
decrypted_text = cipher.decrypt(cipher_text).decode('utf-
8') return decrypted_text # Example usage:
message = "Hello, asymmetric encryption!"
encrypted_message = encrypt_asymmetric(message, public_key)
print("Encrypted:", encrypted_message)
decrypted_message = decrypt_asymmetric(encrypted_message, private_key)
print("Decrypted:", decrypted_message)
Output:
Encrypted: b'\xb8\x05CJ\xf1\x12M\xb4\xc5\xf5\x0cV\xbf\xa5-
\xf1h!\xec\xb1\xb1S\xd3;\xd4Z\xe2\xe4y\xfe\xbe&Q\x1e\xf5\xa8\xd7Rq[\xf9\xf3\xa3\x9dV\xf3\xaa\xd6\x8a\x1c
\xb1r\x1cN\xbc\x8e\x1b\x8f\x8d\x97\xd7\xc8\xb6\xed\xa8\xaa\xd0\xa2\x05\x16S\xfd\xe3~1\xc7D\xc6/\xf1\xd9\xdb\xfc
Result:
The python program for the Asymmetric key algorithm and key exchange algorithm
was implemented and executed successfully.
Program:
import
java.security.KeyPairGenerator;
import java.security.KeyPair; import
java.security.PublicKey; import
java.security.PrivateKey; import
java.security.Signature; import
java.io.*; //importjava.util;
Public class Signature
Test{ privatestaticbyte[]sign(Stringdatafile,PrivateKeyprvKey,StringsigAlg)throwsException{ Signature sig =
Signature.getInstance(sigAlg);
sig.initSign(prvKey);
FileInputStreamfis=newFileInputStream(datafile);
byte[] dataBytes = new byte[1024]; int nread =
fis.read(dataBytes); while (nread > 0)
{ sig.update(dataBytes, 0, nread); nread =
fis.read(dataBytes);
}; returnsig.sign();
}
publicstaticvoidmain(String[]unused)throwsException{
//Generateakey-pair
KeyPairGeneratorkpg=KeyPairGenerator.getInstance("RSA");
kpg.initialize(512); // 512 is the keysize.
KeyPair kp = kpg.generateKeyPair();
PublicKey pubk = kp.getPublic();
PrivateKey prvk = kp.getPrivate(); Stringdatafile="SignatureTest.java";
byte[]sigbytes=sign(datafile,prvk,"MD5withRSA");
//System.out.println("Signature(inhex)::"+Util.byteArray2Hex(sigbytes)); boolean
result = verify(datafile, pubk, "MD5withRSA", sigbytes); System.out.println("Signature
Verification Result = " + result);
//writegeneratedkeypairtofile String filename
= "keypair";
FileOutputStreamfos=null;
ObjectOutputStreamout= null;
try{
fos=newFileOutputStream(filename); out
= new ObjectOutputStream(fos);
out.writeObject(kp); out.close();
} catch(IOExceptionex){
ex.printStackTrace();
}
//nowtrytorecoveritfromthefile FileInputStream
fis = null;
ObjectInputStreamin=null
; KeyPair newkp = null;
try
{ fis=newFileInputStream(filename); in
= new ObjectInputStream(fis); newkp
=
(KeyPair)in.readObject(); in.close();
} catch(Exception ex)
{
ex.printStackTrace();
}
PrivateKeynewprvk=newkp.getPrivate();
System.out.println(prvk.toString());
System.out.println(newprvk.toString());
}}
Output:
Signature Verification Result = true
PrivateKeyInfo [ algorithm: RSA
PrivateKeyFormat: PKCS#8
...
]
PrivateKeyInfo [ algorithm:
RSA PrivateKeyFormat:
PKCS#8
...
]
Result:
Thus the DSA algorithm was executed successfully.
EX:NO: 4 Installation of wire shark, TCPDUMP and observe data
transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram
Aim:
To observe the data transferred in client server communication using TCP/UDP and UDP
/ TCP data gram identification.
Steps:
• After downloading and installing wire shark, you can launch it and click the name of
an interface under Interface List to start capturing packets on that interface.
• For example, if you want to capture traffic on the wireless network , click your
wireless interface. You can configure advanced features by clicking Capture
Options.
• As soon as you click the interface‘s name , you‘ll see the packets start to appear in
real time. Wireshark captures each packet sent to or from your system.
• If you‘re capturing on a wireless interface and have promiscuous mode enabled in
your capture options, you‘ll also see other the other packets on the network.
• Click the stop capture button near the top left corner of the window when you want to
stop capturing traffic.
• Wire shark uses colors to help you identify the types of traffic a tag lance.
• By default, green is TCP traffic, dark blue is DNS traffic, light blue is UDP traffic,
and black identifies TCP packets with problems —for example, they could have been
delivered out-of-order.
OBSERVATIONOFCLIENTSERVERCOMMUNICATIONUSINGTCP/UDP:
By typing the ip address of client in filter box at top of the window in server’s
system and ip address of server in client system we can monitor the client server
communication
UDP/ TCPDATAGRAMIDENTIFICATION:
• If you‘re trying to inspect something specific, such as the traffic a program sends
when phoning home, it helps to closed own all other applications using the network
so you can narrow down the traffic.
• Still, you‘ll likely have a large amount of packets to sift through. That‘s where
Wireshark‘s filters come in.
• The most basic way to apply a filter is by typing it into the filter box at the top of the
window and clicking Apply(or pressing Enter). For example, type ―TCP‖ and you‘ll
see only TCP packets. , type ―DNS‖ and you‘ll see only DNS packets.
• When you start typing, Wire shark will help you auto complete your filter.
You‘ll see the full conversation between the client and the server.
Close the window and you‘ll find a filter has been applied automatically—Wire shark is
showing you the packets that make up the conversation.
Inspecting Packets Click a packet to select it and you can dig down to view its details
You can also create filters from here — just right-click one of the details and use the Apply
as Filter submenu to create a filter based on it.
Result:
Thus we observed the data transferred in client server communication using TCP/
UDP and UDP / TCP data gram was identified.
Ex:No:5 Check message integrity and confidentiality using SSL
Aim:
To write a program for check message integrity and confidentiality using SSL.
Alogrithm:
### Ensuring Message Integrity:
1. *Hash Functions:*
- SSL/TLS uses cryptographic hash functions (e.g., SHA-256) to generate a message digest (hash) of the
transmitted data.
- The hash is sent along with the data.
- The recipient computes the hash of the received data and compares it with the received hash to ensure
integrity.
1. *Handshake:*
- ClientHello: The client initiates communication and provides supported cryptographic algorithms.
- ServerHello: The server selects a cipher suite and shares its digital certificate.
- Key Exchange: ServerKeyExchange (for DHE or ECDHE) or ServerKeyExchange (for RSA) is performed. -
Finished: Both parties confirm the handshake is complete.
2. *Key Derivation:*
- A pre-master secret is exchanged and used to derive encryption keys.
3. *Data Transfer:*
- Using the derived keys, data is encrypted and decrypted using symmetric encryption.
4. *Message Authentication Code (MAC):*
- HMAC is used for message integrity verification.
Program:
import requests
else:
print("Request failed with status code:", response.status_code)
Output:
Request successful!
Response Content: ... (the content of the response)
Result:
The python program for check message integrity and confidentiality using SSL was executed
Successfully.
Ex:No:6(i) Experiment Eavesdropping
Aim:
To write a python program for simulating dictionary attack on password.
Algorithm:
• Python program that simulates a dictionary attack on a password by trying
out a list of commonly used passwords and their variations.
• We first define a list of commonly used passwords and their variations.
• We then define the hash of the password we want to attack (in this
example, "mypass12#@"is hashed using SHA-256).
• We then use a nested loop to try out all possible combinations of common
passwords and their variations.
For each combination, we hash the password using SHA-256 and check if it matches the hashed
password we want to attack.
• If a match is found, we print the password and exit the loop. If no match is
found, we print a message indicating that the password was not available.
Program:
def
eavesdrop_conversation(conversation): for message in
conversation:
print(message)
conversation = ["Hey, how's it going?", "Not bad, you?", "I'm good, thanks!"]
eavesdrop_conversation(conversation)
Output:
Result:
Thus python program for simulating dictionary attack on password was executed
and output was verified successfully.
Ex:No:6(ii) Experiment Dictionary Attack
Aim:
To write a python program for simulating dictionary attack on password.
Algorithm:
• Python program that simulates a dictionary attack on a password by trying
out a list of commonly used passwords and their variations.
• We first define a list of commonly used passwords and their variations.
• We then define the hash of the password we want to attack (in this
example, "mypass12#@"is hashed using SHA-256).
• We then use a nested loop to try out all possible combinations of common
passwords and their variations.
For each combination, we hash the password using SHA-256 and check if it matches the hashed
password we want to attack.
• If a match is found, we print the password and exit the loop. If no match is
found, we print a message indicating that the password was not available.
Program:
common_passwords=[“password”,”password123”,”letmein”,”qwerty”,:123456”,”abc123”,”admin”,”
welcome”,”monkey”,”sunshine”]
password_variations=[“”,”123”,”1234”,”12345”,”123456”,”!”,”@”,”#”,”$”,”%”,”^”,”&”,”*”,”(“,”)”,”
-“,”_”,”+”,”=”,”/”,”\\”,”|”,”[“,”]”,”{“,”}”,”>”,”<”,]
#Hashofthepasswordtobeattacked hashed_password=
hashlib. sha256(b"mypass12#@").hexdigest()
#Try out all possible combinations of common passwords and their variations for password in
common_passwords:
Output:
Password not found
Result:
Thus python program for simulating dictionary attack on password was executed
and output was verified successfully.
Ex:No:6(iii) Experiment MITM attacks
Aim:
To write a python program to implement Man In The Middle Attack
Algorithm:
Step5:
If Alice uses S1 as a key to encrypt a later message to Bob, Malory can decrypt it,
re-encrypt it using S2, and send it to Bob. Bob and Alice won’t notice any problem andmay
assume their communication is encrypted, but in reality, Malory can decrypt, read, modify,
and then re- encrypt all their conversations.
Program:
importr
andom
classA:
definit(self):
# Generating a random private number selected by
alice self.n = random.randint(1, p)
defpublish(self): #
generating public
values return
(g**self.n)%p
def compute_secret(self,
gb): # computing
secret key return
(gb**self.n)%p
classB:
definit(self):
# Generating a random private number selected for
alice self.a = random.randint(1, p) #
Generating a random private number selected
for bob self.b = random.randint(1, p)
self.arr=[self.a,self.b]
defpublish(self,i): #
generating public
values return
(g**self.arr[i])%p
alice=A(
) bob =
A()
eve=B()
# Generating public
values ga =
alice.publish() gb =
bob.publish() gea =
eve.publish(0)
geb=eve.publish(1
)
print(f'Alice published (ga):
{ga}') print(f'Bob published
(gb): {gb}') print(f'Eve published value
for Alice (gc): {gea}') print(f'Eve
published value for Bob
(gd): {geb}')
#Computingthesecretkey
sa =
alice.compute_secret(gea) sea
= eve.compute_secret(ga,0)
sb =
bob.compute_secret(geb) seb
= eve.compute_secret(gb,1)
print(f'Alicecomputed(S1):
{sa
}')
print(f'Eve computed key for Alice (S1) : {sea}')
print(f'Bob computed (S2) : {sb}')
print(f'EvecomputedkeyforBob(S2):{seb}')
Output:
Result:
Thus python program for simulating MITM attack on password was executed and
output was verified successfully.
INSTALLATION PROCEDURE:
1. Download SNORT fromsnort.org
2. Install snort with or without database support.
3. Select all the components and Click Next.
4. Install and Close.
5. Skip the Win P cap driver installation
6. Add the path variable in windows environment variable by selecting new class path.
7. Create a path variable and point it at snort .exe variable name path and variable value
c:\snort\bin.
8. Click OK button and then close all dialog boxes. 9. Open command prompt and type
the commands.
STEPS:
C:\Snort\bin\snort–vd
C:\Snort\bin\snort –dev–l c:\log
C:\Snort\bin\snort–dev–lc:\log–hipaddress/24
C:\Snort\bin\snort–lc:\log–b
snort–d–hipaddress/24–lc:\log–csnort.conf
Result:
Thus intrusion detection system was studied using snort.
Ex:No:9 Explore network monitoring tools
Aim:
To explore network monitoring tools.
Pros
• Up time reporting
• Real-time monitoring
• The network is accessible through mobile
• Multi-user collaboration
Cons
3. Auvik
Platform:Web-based
Auvikis a faster, easy-to-use, cloud-based network monitoring software giving you
instant insight into the networks you manage with automated network discovery,
monitoring, documentation, and much more. This networking performance monitor
tool provides real- time network mapping and inventory, keeping you constantly
updated.
Key feature
• The software runs on Windows Server and Ubuntu Linux.
o This network performance monitoring tool provides a dashboard that displays all your activities.
o It gives alerts immediately when unusual activity occurs.
o The software contains a SaaS package that includes a processing power and storage area for monitoring
software and system logs as well.
• Provides secure SSH access via an in-app terminal
Pros
Cons
4. NetworkBandwidthAnalyzer
Platform: Windows & Linux
Network Bandwidth Analyzeris a multi-vendor network monitoring tool that allows
you to monitor the network’s performance. Detecting, diagnosing, resolving the network
performance issues allows you to use the network more effortlessly
Key features:
• Quickly detects, diagnoses ,and resolves the network performance issues, reducing the
network outrages.
• Easily view IPv4 and IPv6 flow records.
• You can easily Monitor Cisco Net Flow,JuniperJ-Flow,sFlow,HuaweiNetStream,and IPFIX
flow data identifying the applications and protocols consuming the most bandwidth.
• Immediately shows alerts if there is any change in the application traffic activity.
• Easily set alerts if the network monitoring software stops sending you network performance
data.
• The Analyzer collects all the traffic data and converts it into a useable format by which you can
easily monitor the network traffic.
• VM ware Sphere distributed switch support, by which it can filter out east-west traffic on
specific hypervisors.
• Justdragginganddroppingthenetworkperformancemetricsonacommontimeline accelerates the
process of identifying the root cause.
• The software supports the Cisco NBAR2, which provides visibility into HTTP (port 80) and
HTTPS (port 443) traffic without additional probes, spanning ports, etc.
• Easilycreateaschedule,anddeliverin-depthnetworktrafficanalysisandbandwidthreports.
• Thisisoneofthebestfreenetworkmonitoringtoolswhichsupportswirelessnetwork monitoring and
management.
• With CBQoS policy optimization, you can measure the effectiveness of pre-and post-policy
traffic levels per class-map
• Freetrial:Yes,30daysfullyfunctionaltrial.
Pros
IthasamobileversionsupportedbyAndroidand
iOS. Networkmonitoringisdone24×7
Itsupportsover450vendorslikeCanon,HP,Cisco,D-
link,Dell,etc. Usesreal-timedatatodiscoverdevices.
User-friendlynetworkmonitoringtool
Cons
Ithasmanyfeatures,makingittimecaptivatingtounderstanditfully.
5. NetworkPerformanceMonitor
Platform: Windows & Linux
TheNetwork Performance Monitor software helps in saving time and improving the
network security and reliability by managing configurations, compliance for routers,
switches, and other networks, etc.
Key features:
• Ensure high network reliability and uptime with automated backup schedules for routers,
firewalls, and switches.
• Offersfullyautomatedconfigurationformostmanagednetworkdevices.
• Youcan easily view, deploy,track, and backup all the network device configurations fromone
location.
• Providesafastanderror-freeexecutionofconfigurationchanges.
• Youcanidentifythedifferencesinlinesofcodewiththeconfigurationcomparisonfeature.
• Itmaintainstheconfigurationdatabase,whichcanhelpyouinthefuturewithsecurity
misconfigurations.
• Efficientlymanagetheroutersandavoidsecuritymisconfiguration.
• Easilycreatemulti-device-basedbaselineconfigurationsgivingyouareferencepoint.
• Throughtheproactivedriftmanagementfeature,youcanimproveoperationalefficiency.
• Withanetworkinventorytool,youcanincreaseproductivityandsave time.
• Import existing devices, irrespective of the device type, and automatically update your device
information whenever it changes.
• Freetrial:Yes,30-daysfreetrial
Pros
• Itisamulti-vendorinventorysoftware
Itquicklyresolvesnetworkissues.
• Simplifyandimproveyournetworkcompliance
• Itautomaticallyidentifiesvulnerabilitiesandleveragesthem.
ItiscompatiblewithotherSolarWindsmodules.
Cons
Itischallengingtotrackallthechangesintools.
6. BetterStack
Platform:Web-basedandCloud-based
Key features:
• Realtimeobservabilitydashboards
• Actionablethresholdalertingbasedondifferenthosts
• Simpleintegrationwithyourstack
• Out of the box integrations: Datadog, New Relic, Prometheus, Zabbix, AWS, Azure, Google
cloud platform, Slack, Microsoft Teams and more
Uptime,Ping,HTTPS,SSL&TLDexpiration,DNS,Cronjobschecksandmore
30-secondsmonitoringfrequency
Incidentmanagementandon-callalertingbuilt in
• Licensing:Cloud-based
• Price:Freeplanavailable Freetrial:Yes(60daysfree trial)
Pros
• Integratedstatuspagesforincidentcommunication
• Unlimitedon-callalertingonallpaidplans
• Powerfuloutoftheboxintegrations
Cons
LimitedDNSmonitoringoptions
7. Obkio
Platform:Linux,Windows,Mac iOS
Obkio’sNetwork performance monitoring and SaaS solution software helps you to
identify the issues and resolve them to deliver an improved end-user experience. It is one of the
best network monitoring tools that provide real-time network performance updates every 500ms
Key features:
• ContinuousmonitoringusingmonitoringAgents
• ExchangeofSyntheticTraffictomeasureperformance
• MonitoringfromtheEnd-User perspective
• Decentralizedmonitoringbetweenpairsofagentsindifferent locations
• Thisnetworkperformancemonitoringtoolprovideshistoricalperformancetotroubleshoot past
issues
• AutomaticSpeedTeststoassessnetworkhealth
• UserQualityofExperience(QoE)ismeasuredeveryminute
Enable SNMP device monitoring so that you can monitor firewalls, CPU, switches, routers, and
much more.
SaaSapplicationallowsstoringinformationinthecloud,makingitusefulandeasytosetup.
• Freetrial: 14-dayfreetrial
Pros
• Deploysinminutes
• Troubleshootintermittentperformanceissues.
• Themonitoringagentsaresupportedbyeverysystem,Windows,Linux, Hyper-V,and more.
• InplaceswithnoITservers,youcanusehardwareagentsavailableinplug-and-play.
webandmobileappisavailable
Cons
Doesnotofferawiderrangeof Integrations
8. Paessler PRTG
Platform:Windows,Mac,Linux,Android,andiOS
PRTGnetwork monitoring software is known for its advanced infrastructure
management capabilities. Its user interface is very powerful and is the best fit for
organizations with low experience in network monitoring. This is one of the best free
network monitoring tools that supervises the entire IT infrastructure using advanced
technologies like SNMP, WMI, HTTP requests, Pings, SSH, and much more.
Key features:
• Completelymonitorsallthedevices,systems,andtrafficinyourIT infrastructure.
• Thisfreenetworkingmonitoringsoftwaresupportsmulti-sitecapabilities.
ComprisesofSNMPsensorsthatgatherdevicehealthinformation
ThePingfeatureenablesyoutocheckthedevice’shealth information.
Itcontainsextrasensorstomonitorserversand applications.
• Itmonitorsspecificdatasetsfromyourdatabasewith individuallyconfiguredPRTGsensors.
• Entirelymanagesandprovidesdetailedstatisticsofalltheapplicationsrunninginyour network.
• Monitorsalltheserversinreal-timewithregardtotheiraccessibility,availability,and capacity.
• SupervisingforLANsaswellasforwirelessnetworks.
• Itoffersauto-discoverybywhichyoucancreateandmaintainadeviceinventory.
• TheLivetopologymapsinarangeofformatsare available.
• Ithasaprotocolanalyzerthatidentifieshigh-trafficapplications. Freetrial:30-dayfree trial.
Pros
• Thedashboardcontainscolor-codedgraphsoflivedatainyournetworkmonitoringsystem.
• Therearenoadditionalpluginsordownloads;everythingisincludedinPRTG. Itisaneasy-to-
usesolutionforallbusinesssizes.
• ItmonitorsadiverserangeofdeviceswithSNMP
• Itoffersafreeversion
• IthasawiderangeofalertmediumslikeSMS,emails,andanythird-partyintegrations.
Cons
Ithasanenormousrangeoffeaturesthatrequiretimetoclearlyunderstand.
Result:
Thus various network monitoring tool have been explored successfully
Aim:
To study the Configuration of firewall on windows.
Configuring Firewall Defender on Windows: Step1:LaunchStartfromthetaskbar.
Step2:Search“Settings”inthesearchbarifyoudonotfindtheSettingsiconinStartmenu.
Step3:IntheleftpaneofSettings,clickPrivacy&security.
Step4:ClickWindowsSecurityoptioninPrivacy&securitymenu.
Step5:SelectFirewall&networkprotection.
Step 6: Now Window’s Security window will pop up window’s. Here you can verify whether your
Defender firewall is active or not.
Step7: Nowtoconfigurethefirewallaccordingtoyourrequirement,click
Advancedsettings.
YouwillbepromptedbyUserAccountControltogiveAdministrativeaccesstoWindows Defender to
make changes. Click Yes to proceed.
Step 8: Windows Defender Firewall with Advanced Security window will launch after giving
administrative permission.
Step9:Theleftpanehasseveraloptions:
• Inboundrules:Programs,processes,portscanbeallowedordeniedtheincoming
transmission of data within this inbound rules.
• Outboundrules:Herewecanspecifywhetherdatacanbesentoutwardsbythat program,
process, or port.
Step 10: To add a new inbound rule, select Inbound Rules option, then click New Rule… from the
right panel.
3. SelectVPNfromtheleftmenu,thenattheright,clickAddaVPNconnection.
4. Inthedialogboxthat opens
5. Inthedialogboxthat opens
6. SetConnectionname.Forexampleto"UWSPVPN"
7. SetServernameoraddress.ForExample"vpn.uwsp.edu"
8. ClickSave
9. SelectChangeadapteroptions
10. Right-clickUWSPVPNandselectProperties.
11. In the UWSP VPN Properties box select the Networking tab.Select Internet Protocol Version 6and click
Properties.
12. ClickAdvancedontheInternetProtocolVersion6Propertiesboxthatopens.
15. Click OK to the Internet Protocol Version 6 Properties box. This returns you to the UWSP
VPNProperties box.
16. IntheUWSPVPNPropertiesboxnowselectInternetProtocolVersion4andclickProperties.
18. IntheAdvancedTCP/IPSettingsboxontheIPSettingstab,uncheck“Usedefaultgateway…”.
You have now disabled the default gateway for both Internet Protocol Version 6 and version 4.Your
UWSP VPN should be configured.
TostartaUWSPVPN connection
1. ClicktheWindowsStartbuttonandselectSettings.
2. UnderWindowsSettings,selectNetwork& Internet.
3. SelectVPNfromtheleftmenu,thenattheright,click"UWSP VPN".
Result:
Thus the configuration of VPN was studied successfully/.