Secure Remote Access IPSEC Virtual Private Network to University Network System


  • Gajendra Sharma Department of Computer Science & Engineering, Kathmandu University, Dhulikhel, Kavre



With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.


IPSEC; VPN; Network; Communication; Data; Encryption; Integrity authentication; Remote access; University; Security; Server; Client; Peer


[1] Kajal, R., Saini, D., Grewal, K. Virtual Private Network. International Journal of Advanced Research in Computer Science and Software Engineering. 2012, 2(10).

[2] Sastry, A. IPSec VPN vs. SSL VPN: Comparing respective VPN security risks. 2011.

[3] Clayton, N., Pandya, H. M. VPN Over IPSEC. In FreeBSD Handbook, 2016: 742. Retrieved from:

[4] Kang, B., Balitanas, M. O. Vulnerabilities of VPN using IPSec and Defensive Measures. International Journal of Advanced Science and Technology, 2009, 8: 9-18.

[5] Ssycxz. Overview of VPN - Evolution of Private Networks, 2016.

[6] Cisco Systems. CCNA Security Course Booklet Version 1.0. Indianapolis: Cisco Press, 2009.

[7] Powell, J. M. The Impact of Virtual Private Network (VPN) on Acompany’s Network, 2010. Retrieved from:

[8] Singh, Y., Chaba, Y., Rani, P. Integrating - VPN and IDS - An approach to Networks Security. International Journal of Computer Science and Security, 2007, 1(3): 1-13. Retrieved from:

[9] Rouse, M. IPsec (Internet Protocol Security), 2010.

[10] Rehman, M. H. Design and Implementation of Mobility for Virtual Private Network Users. Global Journal of Computer Science and Technology Network, Web & Security, 2013, 13(9): 34-39. Retrieved from:

[11] Deal, R. Key Exchange. Retrieved from The Complete Cisco VPN Configuration Guide, 2005.

[12] VelMurugan. What is ISAKMP, 2008. Retrieved from:

[13] Maughan, D. Internet Security Association and Key Management Protocol (ISAKMP), 1998. Retrieved from:

[14] Oliver, P. G. Making Sense of Split Tunneling. Retrieved from Infosec ISLAND, 2013.

[15] Dhall, Batra, Rani, a. Implementation of ipsec protocol. 2012 Second International Conference on Advanced Computing & Communication Technologies, 2012: 176-181. Rohtak: IEEE. DOI:

[16] Qu, W., Srinivas, S. IPSec-based secure wireless virtual private network. MILCOM 2002. Proceedings, 2002, 2, 1107-1112. DOI:

[17] Sun, S. H. The Advantages and the Implementation of SSL VPN. 2011 IEEE 2nd International Conference on Software Engineering and Service Science. Beijing: IEEE, 2011: 548- 551. DOI:

[18] Lee, H., Nah, J., Jung, K. The Remote Access to IPsec-VPN Gateway over. The 7th International Conference on Advanced Communication Technology, 2005: 567- 569. Taejeon: IEEE. DOI:

[19] Kim, B.-J., Srinivasan, S. Simple Mobility Support for IPsec Tunnel Mode. 2003, 3: 1999-2003. DOI:

[20] Lakbabi, A., Orhanou, G., Hajji, S. E. VPN IPSEC & SSL Technology. 2012 Next Generation Networks and Services NGNS. Agdal: IEEE, 2012: 202-208 . DOI:


How to Cite

Sharma, G. (2021). Secure Remote Access IPSEC Virtual Private Network to University Network System. Journal of Computer Science Research, 3(1), 16–27.


Article Type