Abstract

It aims at existing defects of traditional VPN (Virtual Private Network) in constructing enterprise network, analyses problems which must be considered in designing secure enterprise network, puts forward solution of DMVPN (Dynamic Multipoint VPN) technique to solve the problems that traditional VPN has not solved by now. At the same time, it expatiates on the implementation mechanism of DMVPN, puts forward a concrete case that to adopts the DMVPN technique constructs secure enterprise network of some universities and business chain organization, and network performance indexes are tested. From the results of the test, the DMVPN network entirely satisfies the actual requirements that an enterprise uses a network. It offers a mode that is a convenient and economical investment to an enterprise for building a secure network.

Highlights

  • The fast-moving of digital communications, companies are tending increasingly to use these new technologies for the storage of their data and archiving their activities with a quick, secure and distributed manner over several sites, with the use of virtual private network (VPN) technologies, companies can communicate with each other securely through a public shared infrastructure “Internet” with a low cost compared to traditional solutions such as Frame Relay, ATM, etc

  • Dynamic Multipoint Virtual Private Network (DMVPN) solution is based on the standard protocols; Multipoint Generic Routing Encapsulation « mGRE », Next-Hop Resolution Protocol « NHRP », Internet Protocol Security « Internet Protocol security (IPsec) » and routing protocols, the settings of these protocols vary from one architecture to another, the method “Policy-Based Management of a Secure Dynamic and Multipoint Virtual Private Network” enables centralized management of multiple DMVPN equipments, through a single graphical interface as follow

  • Many research studies have been conducted assessing the performances of DMVPN network, the first article evaluates the performances of DMVPN network varying both, dynamic routing protocols and the size of intermediaries routers, as DMVPN is a client solution, this was a good motivation to complete and to enhance the work by assessing DMVPN performances by varying the number of client-side routers, others works deal with the best practices for deploying dynamic routing protocols on DMVPN networks but without showing the improvement to the network

Read more

Summary

Introduction

For those enterprise networks that are seeking to reduce dependence on spanning tree and a common control plane, are familiar with standard IP troubleshooting tools and techniques, and desire optimal convergence, a routed access design (Layer 3 switching in the access) using EIGRP or OSPF as the campus routing protocol is a viable option. This chapter basically on how we configure LAN network with EIGRP for optimization on a layer 3 switch command line interface. PPTP (Point-to-Point Tunneling Protocol) Point-to-Point Tunneling Protocol (PPTP) is a Layer 2 tunneling protocol that allows a remote client to use a public IP network in order to communicate securely with a private network. Remote users can access a private network via PPTP by first dialing into their local ISP. PPTP connects to the target network by creating a virtual network for each remote client. Rather it relies on an encryption protocol that it passes within the tunnel to provide privacy

Background
Problem Statement
Aims and Objectives
Building a Good Network
The trend toward mergers and acquisitions
Aim and Objectives
Significance of the Study
Scope of the Research
10.1. Tunneling Overview
10.2. GRE Tunnel
12. Why Use GRE Tunnels?
13. Site to Site VPN
14. VTI Site to Site VPN
14.1. VTI Site to Site VPN Types
15. Tunnel Protection Mode
15.3. ISAKMP Policy Configuration
16. Recommendation
17. Conclusion
DESIGN
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call