Article Processing Charges (APC)
Secure Remote Access IPSEC Virtual Private Network to University Network System
With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.
Keywords:IPSEC, VPN, Network, Communication, Data, Encryption, Integrity authentication, Remote access, University, Security, Server, Client, Peer
 Kajal, R., Saini, D., Grewal, K. Virtual Private Network. International Journal of Advanced Research in Computer Science and Software Engineering. 2012, 2(10), Retrieved from: http://www.ijarcsse.com/docs/papers/10_October2012/Volume_2_issue_10_October2012/V2I900209.pdf
 Sastry, A. IPSec VPN vs. SSL VPN: Comparing respective VPN security risks. 2011. Retrieved from TechTarget: http://searchsecurity.techtarget.com/tip/IPSec-VPNvs-SSL-VPN-Comparing-respective-VPN-securityrisks
 Clayton, N., Pandya, H. M. VPN Over IPSEC. In FreeBSD Handbook, 2016: 742. Retrieved from: https://www.freebsd.org/doc/handbook/ipsec.html
 Kang, B., Balitanas, M. O. Vulnerabilities of VPN using IPSec and Defensive Measures. International Journal of Advanced Science and Technology, 2009, 8: 9-18.
 Ssycxz. Overview of VPN - Evolution of Private Networks, 2016. Retrieved from: http://ssycxz.kinja.com/overview-of-vpn-evolutionof-private-networks-1763248734
 Cisco Systems. CCNA Security Course Booklet Version 1.0. Indianapolis: Cisco Press, 2009.
 Powell, J. M. The Impact of Virtual Private Network (VPN) on Acompany’s Network, 2010. Retrieved from: http://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1056&context=honors
 Singh, Y., Chaba, Y., Rani, P. Integrating - VPN and IDS - An approach to Networks Security. International Journal of Computer Science and Security, 2007, 1(3): 1-13. Retrieved from:http://www.cscjournals.org/
 Rouse, M. IPsec (Internet Protocol Security), 2010. Retrieved from TechTarget: http://searchmidmarketsecurity.techtarget.com/definition/IPsec
 Rehman, M. H. Design and Implementation of Mobility for Virtual Private Network Users. Global Journal of Computer Science and Technology Network, Web & Security, 2013, 13(9): 34-39. Retrieved from: https://globaljournals.org
 Deal, R. Key Exchange. Retrieved from The Complete Cisco VPN Configuration Guide, 2005: http://www.fengnet.com/book/vpnconf/ch02lev1sec4.html
 VelMurugan. What is ISAKMP, 2008. Retrieved from: http://discuss.itacumens.com/index.php?topic=32692.0
 Maughan, D. Internet Security Association and Key Management Protocol (ISAKMP), 1998. Retrieved from: https://tools.ietf.org/html/rfc2408
 Oliver, P. G. Making Sense of Split Tunneling. Retrieved from Infosec ISLAND, 2013: http://www.infosecisland.com/blogview/22859-Making-Sense-of-Split-Tunneling-.html
 Dhall, Batra, Rani, a. Implementation of ipsec protocol. 2012 Second International Conference on Advanced Computing & Communication Technologies, 2012: 176-181. Rohtak: IEEE. DOI: https://doi.org/10.1109/ACCT.2012.64
 Qu, W., Srinivas, S. IPSec-based secure wireless virtual private network. MILCOM 2002. Proceedings, 2002, 2, 1107-1112. DOI: https://doi.org/10.1109/MILCOM.2002.1179632
 Sun, S. H. The Advantages and the Implementation of SSL VPN. 2011 IEEE 2nd International Conference on Software Engineering and Service Science. Beijing: IEEE, 2011: 548- 551. DOI: https://doi.org/10.1109/ICSESS.2011.5982375
 Lee, H., Nah, J., Jung, K. The Remote Access to IPsec-VPN Gateway over. The 7th International Conference on Advanced Communication Technology, 2005: 567- 569. Taejeon: IEEE. DOI: https://doi.org/10.1109/ICACT.2005.245934
 Kim, B.-J., Srinivasan, S. Simple Mobility Support for IPsec Tunnel Mode. 2003, 3: 1999-2003. DOI: https://doi.org/10.1109/VETECF.2003.1285375
 Lakbabi, A., Orhanou, G., Hajji, S. E. VPN IPSEC & SSL Technology. 2012 Next Generation Networks and Services NGNS. Agdal: IEEE, 2012: 202-208 . DOI: https://doi.org/10.1109/NGNS.2012.6656108
How to Cite
Copyright © 2021 Author(s)
This is an open access article under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License.