Computer Technology Department - College of Computer Studies De La Salle University
Network Security and Administration (SECADMN)
3.1 Virtual Private Network (Site to Site) Laboratory Report
Fadrilan, Paul Jovie R.
Magat, Rodolfo M.
In a business or an organization, communication is very important especially for long distance or remote places. When a business or an organization grows and needs to have branches to extend their reaches, they have to be connected to these branches in order to keep their business going. Their connection may include transaction of lots of confidential information which is very vital for their business and this information cannot be compromised at any time as it could be the cause of their down fall. The information goes across the internet just to be delivered into remote places and having the confidential data travels across the internet is very risky. That is where Virtual Private Network comes in where it secures the remote connections for long distance communications across the internet.
Virtual Private Network uses a public network, such as the internet, to have a secured connection to remote entities. [http://www.howstuffworks.com/vpn.htm]. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol. The protocol encrypts the data to be sent and decrypts it in the receiving end and provides the connection a “tunnel” that cannot be “entered”. [http://searchenterprisewan.techtarget.com/definition/virtual-private-network]
In this laboratory activity, Virtual Private Network will be configured to enable access between multiple private networks across the internet or a public network. The activity will be focused on a Site-to-Site VPN which is allowing access to the resources of a remote computer for authorized subjects. There are two types of Site-to-Site VPN namely intranet-based and extranet-based. Intranet-based is basically connecting multiple LANS into a single WAN. Extranet-based VPN is connecting LANs of different companies into a single WAN without having to access the intranet of each other with a secured communication. [http://computer.howstuffworks.com/vpn4.htm].
First, is to configure the firewall to allow the remote connections for a Site-to-Site VPN. Configuration of the firewall is vital in this laboratory activity because it will be the one to control the access between networks. The creation of the SSL connection is important because having a SSL connection provides security as it encrypts the data going around the networks may it be a private or a public network. SSL provides a secured communication between a server and a client [http://www.digicert.com/ssl.htm]. The SSL must also be configured in the client side for it to have a proper communication and for it to actually work because SSL works in a server-client environment.
The objective of this laboratory activity is to create a secured connection between LANs by using the Site-to-Site VPN. Practicality-wise, it can be used for companies that has many remote and long-distanced branches and also for companies or organizations that have other partner organizations or associate for them to have shared resources or secured communication without having access to their private networks. This technology will provide trust for transactions across the internet.
Tools or Methodologies:
1. VMware Workstation (tool) – The main software used to run the Sophos software. 2. Firewall Image (tool) - .iso image used to install the Sophos software into the VMware Workstation. 3. Mozilla Firefox Web Browser (tool) – Browser used to access the web interface of the Sophos software. 4. Google Chrome...
DigiCert. 2013. What is SSL (Secure Socket Layer) and what are SSL Certificates? Retrieved on November 6, 2013 from http://www.digicert.com/ssl.htm
Rouse, M. 2007. Virtual Private Network (VPN). Retrieved on November 6, 2013 from http://searchenterprisewan.techtarget.com/definition/virtual-private-network
Tyson, J. 2013. How VPNs Work. Retrieved on November 6, 2013 from http://computer.howstuffworks.com/vpn4.htm
Microsoft 2013,”What Is DHCP?”. Available: Tyson, J. 2013. How VPNs Work. Retrieved on November 6, 2013 from http://www.howstuffworks.com/vpn.htm
Please join StudyMode to read the full document