skip to main content
10.1145/3531028.3531036acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceccConference Proceedingsconference-collections
research-article

Designing Secure and Scalable end-to-end Private Network Connections between sites via Overlay Tunnels

Published:08 July 2022Publication History

ABSTRACT

Today, a secure and scalable end-to-end private network connection between head office and branches is a fundamental requirement of modern-day businesses. There are multiple solutions available, but this research will focus on the wide availability of the technology in most areas. Internet is standard network connectivity that links different branches from a different location to the business headquarter. The widespread availability of the Internet and the compatibility of the Overlay tunnels make a cost-effective solution to connect businesses. The study location is an advertising firm in the Philippines, classified as a small-to-medium-sized enterprise that requires network architecture enhancements. The critical demand is to connect three remote offices with the headquarters office for more protected file and application sharing. The remote users or employees accessing the resources anytime and anywhere should also be considered. The study will use the Generic Routing Encapsulation (GRE) and the Internet Protocol Security (IPSec) as overlay tunnels to implement interconnectivity between sites at remote locations.

Furthermore, in light of significant security breaches, the design will consider the use of new network security measures. The new network design enables secure file and application sharing through overlay tunnels between the headquarters and the other three provincial branches and remote users. Branch connectivity uses GRE over IPSEC tunnels, dynamic routing, and only authorized VPN connections to access HQ resources. The proposed network architecture operated successfully during the test validation (using ping, tracert, and traceroute utility commands). Finally, the suggested network design is secured from MAC address flooding, ping of death (DOS), and VPN snooping based on the vulnerability studies.

References

  1. Edgeworth, Bradley; Rios, Ramiro; Gooley, Jason, and Hucaby, David. CCNP and CCIE Enterprise Core, ENCOR 350-401, Official CertGuide, Advanced your IT Career with Hands-on Learning, Cisco Systems, Cisco Press, 2020.Google ScholarGoogle Scholar
  2. Lacoste, Raymond, and Edgeworth, Brad, CCNP Enterprise Advanced Routing ENARSI 300-410, Official CertGuide, Advanced your IT Career with Hands-on Learning, Cisco Systems, Cisco Press, 2020.Google ScholarGoogle Scholar
  3. Odom, Wendell. CCNA 200-301 Official CertGuide Volume 2. Cisco Press, 2020.Google ScholarGoogle Scholar
  4. Bhalerao, Vitthal, and Sarode, Sambhaji, "A Review Paper on MPLS L3 VPNs Architecture", International Journal of Scientific and Research Publications, Volume 11, Issue 6, June 2021.Google ScholarGoogle ScholarCross RefCross Ref
  5. K. Sandhya and V. Kakulapati, "Establishing Secured Enterprise Network Routing protocols by using DMVPN", International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 8, August 2018Google ScholarGoogle Scholar
  6. Froom, Richard; Sivasubramanian, Balaji; Frahim, Erum. Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide for Switch 642-813. Cisco Press, 2010.Google ScholarGoogle Scholar
  7. M. D. Watkins, "CCNA Security Official Exam Certification Guide (Exam 640-553), Cisco Press, 2008.Google ScholarGoogle Scholar
  8. Cisco, "Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1", San Jose, CA, Cisco Systems, 2018Google ScholarGoogle Scholar
  9. Oracle, "Oracle Documentations – Systems Administration Guide: IP Services," Oracle Corporation, 2010.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICECC '22: Proceedings of the 2022 5th International Conference on Electronics, Communications and Control Engineering
    March 2022
    154 pages
    ISBN:9781450395847
    DOI:10.1145/3531028

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 8 July 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)31
    • Downloads (Last 6 weeks)5

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format