Network Infrastructure Component Report 2022
VerifiedAdded on 2022/09/14
|14
|2934
|16
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK INFRASTRUCTURE COMPONENT
Network Infrastructure Component
Name of the Student
Name of the University
Author Note
Network Infrastructure Component
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORK INFRASTRUCTURE COMPONENT
Table of Contents
Introduction................................................................................................................................2
Scope of the Network.............................................................................................................2
Requirement of the Network..................................................................................................3
Implementation..........................................................................................................................3
IP Addressing Plan.................................................................................................................4
Solution of VPN.....................................................................................................................6
Usefulness of VPN.................................................................................................................8
Conclusion................................................................................................................................10
References................................................................................................................................12
Table of Contents
Introduction................................................................................................................................2
Scope of the Network.............................................................................................................2
Requirement of the Network..................................................................................................3
Implementation..........................................................................................................................3
IP Addressing Plan.................................................................................................................4
Solution of VPN.....................................................................................................................6
Usefulness of VPN.................................................................................................................8
Conclusion................................................................................................................................10
References................................................................................................................................12
2NETWORK INFRASTRUCTURE COMPONENT
Introduction
The infrastructure of network is the software and the hardware resources of a while
network that enable the connectivity of network, operations, communications and
management of a network. It offers the path of communication, services between the end
users, procedures, services, applications and the external networks
The report is developed in order to create a solution of VPN network that connects the
remote location in order to receive and send the packets of data securely. The software and
the hardware those are required for the development of the network is approximated along
with the protocols of networking those are important in order to transmit the sensitive and
confidential data. A tunnel of VPN is required to be developed. The VPN tunnel that will be
developed is utilised in order to transfer the packets of data between the remote sites. The
network topology is to be designed for the company. The usefulness of VPN is discussed in
the report along with an IP addressing scheme. The plan of IP address will assist in order to
configure the network and resolve the errors in the network.
Scope of the Network
The solution of VPN network is created by following the scope of the network (Cai et al
2015):
Removing the disruption and the inconvenience within the end users as it is does not
depend on the performance of the internet
Upgrade the efficiency of the network and the scalability of the network and develop a
secure connection between the sites
Configuration of the network by following the requirements of the organization with the
use of proper encryption method in order to configure the devices
Introduction
The infrastructure of network is the software and the hardware resources of a while
network that enable the connectivity of network, operations, communications and
management of a network. It offers the path of communication, services between the end
users, procedures, services, applications and the external networks
The report is developed in order to create a solution of VPN network that connects the
remote location in order to receive and send the packets of data securely. The software and
the hardware those are required for the development of the network is approximated along
with the protocols of networking those are important in order to transmit the sensitive and
confidential data. A tunnel of VPN is required to be developed. The VPN tunnel that will be
developed is utilised in order to transfer the packets of data between the remote sites. The
network topology is to be designed for the company. The usefulness of VPN is discussed in
the report along with an IP addressing scheme. The plan of IP address will assist in order to
configure the network and resolve the errors in the network.
Scope of the Network
The solution of VPN network is created by following the scope of the network (Cai et al
2015):
Removing the disruption and the inconvenience within the end users as it is does not
depend on the performance of the internet
Upgrade the efficiency of the network and the scalability of the network and develop a
secure connection between the sites
Configuration of the network by following the requirements of the organization with the
use of proper encryption method in order to configure the devices
3NETWORK INFRASTRUCTURE COMPONENT
Requirement of the Network
The solution of VPN network is developed in order to fulfil various requirements. The
requirements are as follows:
Encryption: The encryption is required in order to encode the packets of data from the
unauthorised users. A public key encryption technique can be used in which two different
keys that is the public and the private keys are utilised in order to encode the packets of
data (Song 2018). There are various attacks such as main in the middle attack can be
eliminated by the use of encryption and it maximizes the security of the network
Firewall: the router that is implemented at the entry and the exit point of the network is
required to be configured to ACL. This will limit the admittance of unauthorized users
and it will filter the traffic (Kurniawan et al 2019). A firewall is a system those are
designed in order to stop unauthorized admittance to or from a private network. It
prevents the users of the internet those are unauthorized from accessing the networks
those are connected to the network.
Tunneling: It is utilised in order to develop a logical connection between the site and the
host by the encapsulation of packets of data. Tunneling that is also called; port forwarding
is the transfer of data that is intended in a private network (Yi, Congxiao and Xing 2016).
In this procedure, the nodes of routing in the network are naive that the data transmission
is a portion of the private network.
Implementation
The hardware those are utilised in the network is discussed in the table below:
Type Device Name
Firewall Cisco ASA 5505 firewall
Server AAA Server
Requirement of the Network
The solution of VPN network is developed in order to fulfil various requirements. The
requirements are as follows:
Encryption: The encryption is required in order to encode the packets of data from the
unauthorised users. A public key encryption technique can be used in which two different
keys that is the public and the private keys are utilised in order to encode the packets of
data (Song 2018). There are various attacks such as main in the middle attack can be
eliminated by the use of encryption and it maximizes the security of the network
Firewall: the router that is implemented at the entry and the exit point of the network is
required to be configured to ACL. This will limit the admittance of unauthorized users
and it will filter the traffic (Kurniawan et al 2019). A firewall is a system those are
designed in order to stop unauthorized admittance to or from a private network. It
prevents the users of the internet those are unauthorized from accessing the networks
those are connected to the network.
Tunneling: It is utilised in order to develop a logical connection between the site and the
host by the encapsulation of packets of data. Tunneling that is also called; port forwarding
is the transfer of data that is intended in a private network (Yi, Congxiao and Xing 2016).
In this procedure, the nodes of routing in the network are naive that the data transmission
is a portion of the private network.
Implementation
The hardware those are utilised in the network is discussed in the table below:
Type Device Name
Firewall Cisco ASA 5505 firewall
Server AAA Server
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4NETWORK INFRASTRUCTURE COMPONENT
Router Cisco 1941 Series Router
Switch Cisco 3560 layer 3
There are various software those are required for the creation of the network for the
company and the remote sites. The softwares include:
VPN tool: This tool is utilised in order to encrypt the channel of communication
VPN client: In order to develop a remote connect those are secure
IP Addressing Plan
The network is created following the below IP addressing scheme for connecting the main
and the remote site with each other using the VPN tunnel
Data Center:
In global configuration mode:
ipv6 local pool dhcpv6-pool1
2001:0:0:10::/64 64
Interface fa0/0:
ipv6 dhcp pool dhcpv6 Ipv6 enable
prefix-delegation pool dhcpv6-pool1
lifetime 1800 600
Ipv6 dhcp server dhcpv6
Dns-server 2001:0:0:10::50 No shutdown
Domain-name amy.com exit
exit
Router Cisco 1941 Series Router
Switch Cisco 3560 layer 3
There are various software those are required for the creation of the network for the
company and the remote sites. The softwares include:
VPN tool: This tool is utilised in order to encrypt the channel of communication
VPN client: In order to develop a remote connect those are secure
IP Addressing Plan
The network is created following the below IP addressing scheme for connecting the main
and the remote site with each other using the VPN tunnel
Data Center:
In global configuration mode:
ipv6 local pool dhcpv6-pool1
2001:0:0:10::/64 64
Interface fa0/0:
ipv6 dhcp pool dhcpv6 Ipv6 enable
prefix-delegation pool dhcpv6-pool1
lifetime 1800 600
Ipv6 dhcp server dhcpv6
Dns-server 2001:0:0:10::50 No shutdown
Domain-name amy.com exit
exit
5NETWORK INFRASTRUCTURE COMPONENT
User:
In global configuration mode:
ipv6 local pool dhcpv6-pool2
2001:0:0:20::/64 64
Interface fa0/0:
ipv6 dhcp pool dhcpv6 Ipv6 enable
prefix-delegation pool dhcpv6-pool2
lifetime 1800 600
Ipv6 dhcp server dhcpv6
Dns-server 2001:0:0:10::50 No shutdown
Domain-name amy.com exit
exit
P2P link:
In global configuration mode:
ipv6 local pool dhcpv6-pool2
2001:0:0:30::/64 64
Interface fa0/0:
ipv6 dhcp pool dhcpv6 Ipv6 enable
prefix-delegation pool dhcpv6-pool2
lifetime 1800 600
Ipv6 dhcp server dhcpv6
Dns-server 2001:0:0:10::50 No shutdown
User:
In global configuration mode:
ipv6 local pool dhcpv6-pool2
2001:0:0:20::/64 64
Interface fa0/0:
ipv6 dhcp pool dhcpv6 Ipv6 enable
prefix-delegation pool dhcpv6-pool2
lifetime 1800 600
Ipv6 dhcp server dhcpv6
Dns-server 2001:0:0:10::50 No shutdown
Domain-name amy.com exit
exit
P2P link:
In global configuration mode:
ipv6 local pool dhcpv6-pool2
2001:0:0:30::/64 64
Interface fa0/0:
ipv6 dhcp pool dhcpv6 Ipv6 enable
prefix-delegation pool dhcpv6-pool2
lifetime 1800 600
Ipv6 dhcp server dhcpv6
Dns-server 2001:0:0:10::50 No shutdown
6NETWORK INFRASTRUCTURE COMPONENT
Domain-name amy.com exit
exit
Solution of VPN
The design of the network is developed in the Cisco Packer Tracer and it is
configured in order to develop a VPN tunnel of IPSEC between the remote sites (Salman
2017). The establishment of VPN network assists in order to recognise the needed and the
present problem of interoperability those are faced for the development of network. The VPN
those are remote access is utilised by the branch in order to connect with the key branch. The
advantage of connecting with the main branch is that the employees of the company can
access the network of the company by using the network. There are various types of remote
access technologies. These include VPNs, PAM, VPAM and many more. However, in this
network the remote access VPN is used. A remote-access VPN permits a user to connect to a
network that is private from a location that is remote using a desktop or laptop (Sushma and
Sanguankotchakorn 2018). A remote-access VPN permits the users to develop secure
connection with a network of computer that is remote.
Domain-name amy.com exit
exit
Solution of VPN
The design of the network is developed in the Cisco Packer Tracer and it is
configured in order to develop a VPN tunnel of IPSEC between the remote sites (Salman
2017). The establishment of VPN network assists in order to recognise the needed and the
present problem of interoperability those are faced for the development of network. The VPN
those are remote access is utilised by the branch in order to connect with the key branch. The
advantage of connecting with the main branch is that the employees of the company can
access the network of the company by using the network. There are various types of remote
access technologies. These include VPNs, PAM, VPAM and many more. However, in this
network the remote access VPN is used. A remote-access VPN permits a user to connect to a
network that is private from a location that is remote using a desktop or laptop (Sushma and
Sanguankotchakorn 2018). A remote-access VPN permits the users to develop secure
connection with a network of computer that is remote.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7NETWORK INFRASTRUCTURE COMPONENT
The working of the remote access VPN is by developing a remote-access connection
that is secure to the server that is configured with the service of VPN. During the procedure
of connection, the server of VPN allocates an address of IP to the client that is remote. The
current route is that the client is asking for remote access that is secure to be changed. After
that, the connection is developed securely in the network of VPN. The establishment of the
solution of VPN offers various benefits to the Company (Deshmukh and Iyer 2017). The
Company have various employees working in various locations around the world. The end
user can then connect to the network of the company by utilising a client software of VPN. It
offers the credentials of authentication in order to log in he developed network of VPN.
There are various authentication risks those are related and the problems of access
control are required to be handled for the implementation of the network (Wang et al 2018).
The sharing of desktop is required to be disabled as it can be utilised by the attacker in order
to conduct the harmful activity over the network that is established.
The working of the remote access VPN is by developing a remote-access connection
that is secure to the server that is configured with the service of VPN. During the procedure
of connection, the server of VPN allocates an address of IP to the client that is remote. The
current route is that the client is asking for remote access that is secure to be changed. After
that, the connection is developed securely in the network of VPN. The establishment of the
solution of VPN offers various benefits to the Company (Deshmukh and Iyer 2017). The
Company have various employees working in various locations around the world. The end
user can then connect to the network of the company by utilising a client software of VPN. It
offers the credentials of authentication in order to log in he developed network of VPN.
There are various authentication risks those are related and the problems of access
control are required to be handled for the implementation of the network (Wang et al 2018).
The sharing of desktop is required to be disabled as it can be utilised by the attacker in order
to conduct the harmful activity over the network that is established.
8NETWORK INFRASTRUCTURE COMPONENT
Usefulness of VPN
The full form of VPN is Virtual Private Network. It extends a network that is private
across a network that is public and enables various users to obtain and transmit data
transversely in the public or shared network. The technology of VPN is created in order to
permit the remote users and the offices of branch to access the resources and applications of
the remote site. The data will be encrypted utilising a VPN and it will eliminate various forms
of Man in the Middle attack (Sinha 2017). The address of IP is hidden from the internet from
the server of VPN as it acts as a proxy between the internet and the computer. There is
various importance of VPN in the network. The importance of VPN is as follows:
Upgraded Security: A Virtual Private Network has various advantages in order to
maximize the privacy and safety during the surfing the internet from the hackers. By
utilising the VPN, it will keep the IP address of the network safe, it masks the original
location, and the data of the company will be encoded from unauthorized access (Ibrahim
2017). An ISP is utilised in order to see all the information of the customers. However, if
the VPN is implemented, the ISP cannot see the log of the user.
Remote access: Utilising VPN shows the information can be remotely accessed from any
kind of location that permits the user to access the content if there are any limitations on
the website (Haug et al 2018). Utilising VPN can maximize the productivity of the
company, as the employees will not have to be in a specific location in order to be
productive.
Cost: Each service provider of VPN will tend to show the various packages. Once the
Company will start utilising the VPNs, it will save the costs of data. The network allows
the user o access various information and saving the consumption of data.
Remote Control: Utilising a VPN permits various users to access various information
remotely from various places and employees can so their work from various places on the
Usefulness of VPN
The full form of VPN is Virtual Private Network. It extends a network that is private
across a network that is public and enables various users to obtain and transmit data
transversely in the public or shared network. The technology of VPN is created in order to
permit the remote users and the offices of branch to access the resources and applications of
the remote site. The data will be encrypted utilising a VPN and it will eliminate various forms
of Man in the Middle attack (Sinha 2017). The address of IP is hidden from the internet from
the server of VPN as it acts as a proxy between the internet and the computer. There is
various importance of VPN in the network. The importance of VPN is as follows:
Upgraded Security: A Virtual Private Network has various advantages in order to
maximize the privacy and safety during the surfing the internet from the hackers. By
utilising the VPN, it will keep the IP address of the network safe, it masks the original
location, and the data of the company will be encoded from unauthorized access (Ibrahim
2017). An ISP is utilised in order to see all the information of the customers. However, if
the VPN is implemented, the ISP cannot see the log of the user.
Remote access: Utilising VPN shows the information can be remotely accessed from any
kind of location that permits the user to access the content if there are any limitations on
the website (Haug et al 2018). Utilising VPN can maximize the productivity of the
company, as the employees will not have to be in a specific location in order to be
productive.
Cost: Each service provider of VPN will tend to show the various packages. Once the
Company will start utilising the VPNs, it will save the costs of data. The network allows
the user o access various information and saving the consumption of data.
Remote Control: Utilising a VPN permits various users to access various information
remotely from various places and employees can so their work from various places on the
9NETWORK INFRASTRUCTURE COMPONENT
globe. This has upgraded the efficiency and it will increase the productivity of the
company
Sharing of files: If an organization operates with various teams and there is a requirement
in order to share a file over a long distance, utilising a VPN can be the best solution in
order to speed up the procedure of transmitting the information to large distances. This
makes the implementation of various tasks easily.
Anonymity: The network of VPN permits the end users to surf the internet in anonymity.
When the users want to see the information online, they can hide their location by
utilising a virtual private network (Daud et al 2018). If someone tries to monitor the
activities, then it becomes tough to track the location
Change IP address: A network of VPN also permits the users to change their address of
IP and to see the information on various websites registered for different countries. This
does not influence the computer and the end user can disconnect the network when seeing
the correct information.
Better performance: When a network of VPN is implemented, it leads to maximized
bandwidth and the speed of the network increases. The efficiency of the network also
maximizes due to the VPN network. The network can be made better by implementation
of VPN network when large files are to be downloaded. For the areas where the network
is not strong, a VPN is utilised in order to increase the speed of the network. It also
minimizes the rate the internet is used.
Flexible: Adding various end users to a VPN is simple and easy. The flexibility of the
network is upgraded as the Company can connect various workers from various locations.
The connection are also secured to make sure that all the information those are shared is
safeguarded from the access those are unauthorised.
globe. This has upgraded the efficiency and it will increase the productivity of the
company
Sharing of files: If an organization operates with various teams and there is a requirement
in order to share a file over a long distance, utilising a VPN can be the best solution in
order to speed up the procedure of transmitting the information to large distances. This
makes the implementation of various tasks easily.
Anonymity: The network of VPN permits the end users to surf the internet in anonymity.
When the users want to see the information online, they can hide their location by
utilising a virtual private network (Daud et al 2018). If someone tries to monitor the
activities, then it becomes tough to track the location
Change IP address: A network of VPN also permits the users to change their address of
IP and to see the information on various websites registered for different countries. This
does not influence the computer and the end user can disconnect the network when seeing
the correct information.
Better performance: When a network of VPN is implemented, it leads to maximized
bandwidth and the speed of the network increases. The efficiency of the network also
maximizes due to the VPN network. The network can be made better by implementation
of VPN network when large files are to be downloaded. For the areas where the network
is not strong, a VPN is utilised in order to increase the speed of the network. It also
minimizes the rate the internet is used.
Flexible: Adding various end users to a VPN is simple and easy. The flexibility of the
network is upgraded as the Company can connect various workers from various locations.
The connection are also secured to make sure that all the information those are shared is
safeguarded from the access those are unauthorised.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10NETWORK INFRASTRUCTURE COMPONENT
Scalability: For various companies, developing a VPN is not expensive and it can be
easily expanded as the Company expand. The costs of maintenance are low and the
network does not have breakdown. It helps various companies to perform their operations
without any hindrance and increase their productivity with the help of VPN. Therefore, it
is important to implement a VPN network in the company.
The VPN should be implemented in the network as it provides various benefits to the
company. The VPN will encode the data packets and help to stop the unauthorized access of
the users. The importance of VPN those are discussed above will help the company to
increase it productivity by connecting various workers those are located around the world
(Babkin and Stroganova 2019). The company will also save large amount of money by
implementing the VPN network. If the Company expands, the VPN can also be expanded to
the features of scalability. Therefore, the Company must implement VPN in order to connect
to the remote sites and the remote users and increase its productivity.
Conclusion
From the report, it can be inferred that a Virtual Private Network is very important for
the company, as it will connect the remote sites and the remote users. The report provides an
overview of the scope by which the network of the company will be implemented. The
requirements that will be required in order to implement the VPN are discussed. The
requirements include firewall, tunneling and encryption. These are very important for the
network and their functions are discussed in the report. The report focuses on the IP
addressing scheming that will be provided in the report. The report provides an illustration of
the network design of the Company. The working of the VPN and the way it will provide
benefit to the company are focussed in the report. It is very important for the Company to
implement the VPN in order to get the benefits provided by it. There are various importance
Scalability: For various companies, developing a VPN is not expensive and it can be
easily expanded as the Company expand. The costs of maintenance are low and the
network does not have breakdown. It helps various companies to perform their operations
without any hindrance and increase their productivity with the help of VPN. Therefore, it
is important to implement a VPN network in the company.
The VPN should be implemented in the network as it provides various benefits to the
company. The VPN will encode the data packets and help to stop the unauthorized access of
the users. The importance of VPN those are discussed above will help the company to
increase it productivity by connecting various workers those are located around the world
(Babkin and Stroganova 2019). The company will also save large amount of money by
implementing the VPN network. If the Company expands, the VPN can also be expanded to
the features of scalability. Therefore, the Company must implement VPN in order to connect
to the remote sites and the remote users and increase its productivity.
Conclusion
From the report, it can be inferred that a Virtual Private Network is very important for
the company, as it will connect the remote sites and the remote users. The report provides an
overview of the scope by which the network of the company will be implemented. The
requirements that will be required in order to implement the VPN are discussed. The
requirements include firewall, tunneling and encryption. These are very important for the
network and their functions are discussed in the report. The report focuses on the IP
addressing scheming that will be provided in the report. The report provides an illustration of
the network design of the Company. The working of the VPN and the way it will provide
benefit to the company are focussed in the report. It is very important for the Company to
implement the VPN in order to get the benefits provided by it. There are various importance
11NETWORK INFRASTRUCTURE COMPONENT
of VPN and the Company must understand the importance so that they can implement the
VPN. The importance of VPN includes security, cost, remote access, flexibility, scalability
and many more and with the help of these, the Company can easily increase its productivity.
of VPN and the Company must understand the importance so that they can implement the
VPN. The importance of VPN includes security, cost, remote access, flexibility, scalability
and many more and with the help of these, the Company can easily increase its productivity.
12NETWORK INFRASTRUCTURE COMPONENT
References
Babkin, V.A. and Stroganova, E.P., 2019, July. Evaluation and Optimization of Virtual
Private Network Operation Quality. In 2019 Systems of Signal Synchronization, Generating
and Processing in Telecommunications (SYNCHROINFO) (pp. 1-4). IEEE.
Cai, W., Zhao, H., Wang, J. and Lin, C., 2015. A unifying network topological model of the
energy internet macro-scope structure. Proceedings of the CSEE, 35(14), pp.3503-3510.
Daud, F.A., Ab Rahman, R., Kassim, M. and Idris, A., 2018, October. Performance of
Encryption Techniques Using Dynamic Virtual Protocol Network Technology. In 2018 IEEE
8th International Conference on System Engineering and Technology (ICSET) (pp. 29-34).
IEEE.
Deshmukh, D. and Iyer, B., 2017, May. Design of IPSec virtual private network for remote
access. In 2017 International Conference on Computing, Communication and Automation
(ICCCA) (pp. 716-719). IEEE.
Haug, R., Kolesnikov, R., Munn, K. and Taylor, G., 2018. Virtual Private Network
Security. Network Security, 4, p.2.
Ibrahim, L., 2017. Virtual private network (vpn) management and ipsec tunneling
technology. Middle East, 1.
Kurniawan, D.E., Arif, H., Nelmiawati, N., Tohari, A.H. and Fani, M., 2019, March.
Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator.
In Journal of Physics: Conference Series (Vol. 1175, No. 1, p. 012031). IOP Publishing.
Salman, F.A., 2017. Implementation of IPsec-VPN tunneling using GNS3. Indonesian
Journal of Electrical Engineering and Computer Science, 7(3), pp.855-860.
References
Babkin, V.A. and Stroganova, E.P., 2019, July. Evaluation and Optimization of Virtual
Private Network Operation Quality. In 2019 Systems of Signal Synchronization, Generating
and Processing in Telecommunications (SYNCHROINFO) (pp. 1-4). IEEE.
Cai, W., Zhao, H., Wang, J. and Lin, C., 2015. A unifying network topological model of the
energy internet macro-scope structure. Proceedings of the CSEE, 35(14), pp.3503-3510.
Daud, F.A., Ab Rahman, R., Kassim, M. and Idris, A., 2018, October. Performance of
Encryption Techniques Using Dynamic Virtual Protocol Network Technology. In 2018 IEEE
8th International Conference on System Engineering and Technology (ICSET) (pp. 29-34).
IEEE.
Deshmukh, D. and Iyer, B., 2017, May. Design of IPSec virtual private network for remote
access. In 2017 International Conference on Computing, Communication and Automation
(ICCCA) (pp. 716-719). IEEE.
Haug, R., Kolesnikov, R., Munn, K. and Taylor, G., 2018. Virtual Private Network
Security. Network Security, 4, p.2.
Ibrahim, L., 2017. Virtual private network (vpn) management and ipsec tunneling
technology. Middle East, 1.
Kurniawan, D.E., Arif, H., Nelmiawati, N., Tohari, A.H. and Fani, M., 2019, March.
Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator.
In Journal of Physics: Conference Series (Vol. 1175, No. 1, p. 012031). IOP Publishing.
Salman, F.A., 2017. Implementation of IPsec-VPN tunneling using GNS3. Indonesian
Journal of Electrical Engineering and Computer Science, 7(3), pp.855-860.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13NETWORK INFRASTRUCTURE COMPONENT
Sinha, S., 2017. Virtual Private Network or VPN. In Beginning Ethical Hacking with
Python (pp. 185-189). Apress, Berkeley, CA.
Song, D., 2018. Encryption and information network. NeuroQuantology, 16(5).
Sushma, A. and Sanguankotchakorn, T., 2018, December. Implementation of IPsec VPN with
SIP Softphones using GNS3. In Proceedings of the 2018 VII International Conference on
Network, Communication and Computing (pp. 152-156).
Wang, G., Sun, Y., He, Q., Xin, G. and Wang, B., 2018, June. A Content Auditing Method of
IPsec VPN. In 2018 IEEE Third International Conference on Data Science in Cyberspace
(DSC) (pp. 634-639). IEEE.
Yi, B., Congxiao, B. and Xing, L., 2016, May. FlowLAN: A non-tunneling distributed virtual
network based on IPv6. In 2016 IEEE Information Technology, Networking, Electronic and
Automation Control Conference (pp. 229-234). IEEE.
Sinha, S., 2017. Virtual Private Network or VPN. In Beginning Ethical Hacking with
Python (pp. 185-189). Apress, Berkeley, CA.
Song, D., 2018. Encryption and information network. NeuroQuantology, 16(5).
Sushma, A. and Sanguankotchakorn, T., 2018, December. Implementation of IPsec VPN with
SIP Softphones using GNS3. In Proceedings of the 2018 VII International Conference on
Network, Communication and Computing (pp. 152-156).
Wang, G., Sun, Y., He, Q., Xin, G. and Wang, B., 2018, June. A Content Auditing Method of
IPsec VPN. In 2018 IEEE Third International Conference on Data Science in Cyberspace
(DSC) (pp. 634-639). IEEE.
Yi, B., Congxiao, B. and Xing, L., 2016, May. FlowLAN: A non-tunneling distributed virtual
network based on IPv6. In 2016 IEEE Information Technology, Networking, Electronic and
Automation Control Conference (pp. 229-234). IEEE.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.