Mini Project Synopsis
Mini Project Synopsis
Bengaluru
A MINI PROJECT
SYNOPSIS
ON
“Personal VPN Server”
Submitted in partial fulfilment of the requirements for the award of the degree of
DIPLOMA
IN
COMPUTER SCIENCE & ENGINEERING
Submitted By
Mr. PRINCE KUMAR MALI
544CS20023
• INTRODUCTION
• METHODOLOGY
• ANALYSIS
• DISCUSSION
• ADVANTAGES
• ARCHITECTURE
• REQUIREMENTS
• CONCLUSION
• REFERENCES
ABSTRACT
A virtual Private Network (VPN) can be defined as a way to provide secure communication
between members of a group though use of public telecommunication, infrastructure,
maintaining privacy through the use of a tunneling protocol and security procedures. There
are many different VPN solutions out there, and just deciding which one to choose can be
difficult since they all have advantages and disadvantage. VPNs can be categorized as
secure or Trusted VPNs, Client -based or web-based VPNs , Customer Edge-based or
Provider Edge-based VPNs , or Outsourced or In-house VPNs .These categories often
overlap each other .In order to decide what VPN solutions to choose for different parts of
the enterprise infrastructure ,the Chosen solution should be the one that best meets the
requirements of the client/customer .The purposed of this paper is to serve as a basic when
creating an enterprise WAN which connects sites and user together using VPN technology.
The purpose of creating such a WAN is to allow the resources of a company to be
remotely accessed.
INTRODUCTION
VPN stands for "Virtual Private Network" or "Virtual Private Networking." A VPN is a
private network in the sense that it carries controlled information, protected by various
security mechanisms, between known parties. VPNs are only "virtually" private, however,
because this data actually travels over shared public networks instead of fully dedicated
private connections. The main benefit of a VPN is the potential for significant cost
savings compared to traditional leased lines or dial up networking. These savings come
with a certain amount of risk, however, particularly when using the public Internet as the
delivery mechanism for VPN data.
The performance of a VPN will be more unpredictable and generally slower than dedicated
lines due to public Net traffic. Likewise, many more points of failure can affect a Net-
based VPN than in a closed private system. Utilizing any public network for
communications naturally raises new security concerns not present when using more
controlled environments like point- to-point leased lines.
VPNs may save money in several different ways. Companies that lease private lines
typically pay a very high monthly fee, and a VPN can replace these lines with much less
expensive, shorter connections to a local ISP. VPNs can also support remote access
connectivity for travelers. Instead of configuring remote access servers and paying for the
long-distance charges to reach them, an organization can rely on an ISP to support local
access on both ends of the VPN connection.
METHODOLOGY:
This topic is chosen in order to become more familiar theoretically in the field of
secure network connection. To complete this research, I have done the following things:
1. Various articles in the Internet were thoroughly examined and information was
collected.
2. Several e-books and books from the library were used to find the content about the
topics.
3. Consultation with friends was also done which helped in conduction the
research in more depth.
4. For practical test, I have been through www.vpnforuk.com for testing free VPN
service.
ANALYSIS:
VPN is growing very fast as the security is the major concern in the world. Modern
technology has shown great changes the way we work few years ago. People started to
work remotely and are seeking more security for their work. So, in upcoming days VPN
would be the prime requirement for every organization and business people. Moreover,
those who are sensitive towards their personal information VPN technology would be their
first choice.
DISCUSSION:
A VPN works by using the shared public infrastructure while maintaining privacy through
security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP) along with IPSec (IPSec/L2TP). In effect, the protocols, by encrypting data at the
sending end and decrypting it at the receiving end, send the data through a "tunnel" that
cannot be "entered" by data that is not properly encrypted. An additional level of security
involves encrypting not only the data, but also the originating and receiving network
addresses.
ADVANTAGES
A Virtual private network (VPN)n extends a private network across a public network and
enables users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network. Applications running on
a computing device eg. A laptop, desktop smartphone, across a VPN may therefore benfit
from the functionality, security and management of the private network Encryption is a
common , through not an internet part of a VPN connection.
Requirement’s
Hardware’s required
Windows 10 or latest
Ram (4 GB)
Wi-Fi or internet
Software Required
IAM User in AWS account (with full policy permission)
OpenVPN server instance
CONCLUSION
A VPN Connection establish a secure connection between you and the internet. Via the
VPN , all your data traffic is routed through an encrypted virtual tunnel. This disguises your
IP address when you use the internet, making its location invisible to everyone. A VPN
connection is also secure against external attacks. That’s because only you can access the
data in the encrypted tunnel – and nobody else can because they don’t have the key. A VPN
allows you to access regionally restricted content from anywhere in the world.
Network security is one of the trending topics in modern days. As world is more
vulnerable, VPN importance has increased. Business organization nowadays is not
limited to one place. So, they are in need of security in cheap price which can
fulfill by using VPN and its modern tunneling protocol which has been impossible
for anyone the go through it.
REFERENCES