SlideShare a Scribd company logo
1 of 5
Download to read offline
American Research Journal of Humanities Social Science (ARJHSS)R) 2019
ARJHSS Journal www.arjhss.com Page |64
American Research Journal of Humanities & Social Science (ARJHSS)
E-ISSN: 2378-702X
Volume-02, Issue-06, pp-64-68
June-2019
www.arjhss.com
Research Paper Open Access
Testing PKI and VPN infrastructure at the University of Culture,
Sports and Tourism
Le Ngoc Hoan - Vu ThiThuy
Thanh Hoa University of Culture, Sports and Tourism, Vietnam
*Corresponding Author: Le Ngoc Hoan
ABSTRACT:- Public key infrastructure - PKI and a private network connection on a shared network
(Virtual Private Network-VPN) shows great efficiency in security and information security for organizations,
enterprise. Therefore, they have been researched and developed by many scientists and organizations for current
network systems and services. Researching and testing PKI infrastructure, a virtual private network (VPN)
applies to Universities ThanhHoa Culture, Sports and Tourism. The research focuses on research on PKI
infrastructure and VPN on the basis of theory. After that, building on the testing environment is to build and
connect on LAN system at 2 campuses of the school on windows server 2012.
Keywords: Public key, PKI infrastructure, Virtual private network, Security, Safety and security.
I. INTRODUCTION
The development of security policies and mechanisms, security for systems and transmission lines is
quite diverse and popular. In particular, the application of PKI infrastructure for the most common security and
security issues is bringinggreat efficiency. Understanding and building PKI infrastructure in conjunction with
VPN infrastructure are an approach for a new platform that we can deploy to test and apply to practice to
improve managing efficiency in order to meet the needs of data access and applications for remote users via the
internet. The research results can be applied to all branch offices, between offices need to exchange data with
each other.
II. IMPLEMENTATION REQUIREMENTS
*Connection
Designing requirements set out to build a secure connection system among facilities, units are far from the
Center on the basis of making the most of available equipment and network infrastructure of the University of
Culture, ThanhHoa Sports and Tourism. This system is compatible with current applications, flexible,
compatible with various connection infrastructure such as ADSL, LeaseLine,.
*Security
To ensure a safe connection to the main building (establishment 1), it requires a solution:
- Using modern security technologies.
- Flexibly change security methods.
- Supplementing security methods to ensure safety and security.
*Administration
Ensuring the continued operation of the network, the solution must design the monitoring software;
administer the VPN Server system at the main facility. The software has the ability to monitor connections.
Network administrators must fully and regularly capture information about configuration, problems and all data
related to network usage.
*Reasonable investment costs
In order to make the solution feasible, in addition to technical requirements, security ... the investment
cost is one of the most important requirements. When deployed with the model and the number of branches
American Research Journal of Humanities Social Science (ARJHSS)R) 2019
ARJHSS Journal www.arjhss.com Page |65
connected to large start-up costs are huge. With the introduction of a reasonable investment solution, it will
create favorable conditions for application in practice.
III. RESEARCH METHODS
3.1. Selection model
The test model is a remote virtual private network model using common software and available
products currently that are being exploited on the network of the ThanhHoa University of Culture, Sports and
Tourism.
Remote access clients are personal computers with modems, the operating system of Windows XP or
Windows 7, Windows 10, etc. The machine is configured as a VPN client.
A server is a central machine installed with Windows server 2012. The server has 2 network interfaces,
with routing and remote access services. In these two interfaces, an interface is used to connect to the internet
via ethernet. The other interface is used to connect to the local network via ethernet with the IP address
configured as a VPN server.
Figure 3.1. Remote access network model
Figure 3.2. Building network system at school to test PKI, virtual private network for ThanhHoa
University of Culture, Sports and Tourism
American Research Journal of Humanities Social Science (ARJHSS)R) 2019
ARJHSS Journal www.arjhss.com Page |66
Figure 3.3. Data flow diagram
3.2. Selecting tools, implementing installation
- Using the operating system of Windows server 2012 installed on the Server machine;
- Client machines using the operating systems of Windows XP, Windows 7 or Windows 10;
- Routing routers;
- Other necessary connection devices
- Connection settings in the system:
1. Computer Server installed windows server 2012is setup PKI and VPN infrastructure, with 2 network
interfaces.
2. Client machines in LAN network connect directly with a server that is located at the establishment 1.
3. Client machines outside the system are located at the establishment 2 connecting computers in the system at
the establishment 1 by separate pipelines via the server with a separate policy.
- Specific deployment:
B1. Installing windows server enterprise 2012 on the server (the VPN server)
B2. Installing Internal Client machines in the LAN network at the establishment 1 with the server.
B3. Installing the External Client at the establishment 2 outside the LAN system - Set up a connection for Client
and Server
B4. Setting up Network Adapter for Internal Client; Setting up the IP address for connections in the system.
B5. Setting up Network Adapter for External Client
B6. Setting up Network Adapter for Server
B7. Setting up VPN for users with their own policies
B8. Setting up a VPN for the user (Client)
B9. Setting up a policy for the user - Network policy and Access service
B10. Setting up the Routing and Remote Access Service for the Client
B11. Checking information the 1 Client connected to the system via the VPN created by the server
B12. Setting up Remote Access for external clients
B13. Testing client outside connecting data access to Client in the LAN system via VPN
4. Evaluating the effectiveness of research and system test deployment
4.1. These achievements
For the purpose of the project "Testing PKI infrastructure, a virtual private network for the ThanhHoa
University of Culture, Sports and Tourism". I have conducted research and presented research results on issues:
*About infrastructure:
- Material facilities for information technology are met to be able to deploy and build systems such as
computers, transmission lines, and connected devices.
- Having sufficient force of technicians and lecturers to ensure knowledge to participate in deploying and
operating the system.
- ADSL high-speed internet service uses a fiber optic transmission line, ensuring good transmission speed.
Xửlývà
lưutrữ
DL
Cácphòng
ban
củađơnvị
Hệthốngbáocáoc
hung
BGHKếhoạchcôngcôn
gviệc
Hệthốngbáocáon
ghiệpvụ
Internet
Cơ sở 2
Các ban
QLDA
Cơ sở 1
American Research Journal of Humanities Social Science (ARJHSS)R) 2019
ARJHSS Journal www.arjhss.com Page |67
- Units: departments, faculties, and centers are fully equipped with computer systems, ensuring common
configuration.
*About models and options
On the basis of application requirements set out: building applications of PKI infrastructure and virtual
private network applied to the ThanhHoa University of Culture, Sports and Tourism. The first step is to identify
the model of PKI architecturewith only one CA, which is applicable only to faculty members at centers,
departments, and faculties of two campuses with a small number of visits. Therefore, the model is built with the
following criteria and requirements:
- The construction model is not too complicated and responsive to remote access, ensuring convenience and
ensuring information security during exploitation and exchange, in accordance with general conditions and
requirements in management and exchange of school information.
- A model is a form of ensuring the convenience, quickness, security and information security for small and
medium-sized units and organizations with the use of PKI infrastructure and virtual private network to reduce
the cost; proactive in managing and operating information compared to using services of suppliers in the market.
- The model can be developed and expanded when the system increases the need to use and scale the system or
has plans to cooperate with units outside the school system.
* Implementation policies and services for information security
 IP address management
The boom in the use of IP to transmit data, both inside and outside the network of companies,
businesses, etc. leads to some problems in IP allocation and management. Initially, the IP address space is 32
bits (IPv4). However,
The issue of dynamic IP has solved the allocation of IP addresses and routing, but it has complicated
the construction of the VPN. IPSec is a protocol, which may be the most suitable for use with IPv6, but most of
them must be compatible with IPv4 and have more mechanisms to solve problems. One solution to increase the
IP address management space is the use of IP in a virtual private network (VPN) that remains connected to the
public internet.
 Building PKI security
Currently, many virtual private networks (VPNs) are showing limitations because the security system
itself is too simple. The problem is to be able to meet the requirements of developing a large and highly secure
virtual private network. Most virtual private networks today are being exploited without the use of public key
infrastructure (PKI). In the simplest way, it can be done by setting up the configuration at both ends of the VPN
tunnel and sharing a common secret - a pair of passwords.
Two VPN terminals can be authenticated through an electronic certificate - A kind of "electronic
membership card" that is indispensable in large VPN networks. For electronic certificates, this organization is
called a certification system (CA-Certification Authority). VPN networks use electronic certificates when the IP
tunnel is initialized, the endpoints will authenticate each other through electronic certificates. Public key
infrastructure will play an important role in successfully building large VPN networks.
 Building a firewall
A firewall is a solid barrier between a private network and the Internet. We can set up firewalls to limit
the number of open ports, packet types, and protocols that are passed.
The firewall will partition policy areas and set access policies for remote access to the system. This solution
ensures control and policy settings for the VPN address space.
 Management solution
Management solution is indispensable for managing VPN network with a large number of connections.
Administration and configuration work through the command line. This makes it difficult to monitor the
connection to the system, make configuration for newcomers to access the system.
 Quality of service management
To coordinate various forces in the multi-service network, including the transmission of messages, online
transactions, multimedia data,…createmany difficulties for bandwidth allocation and network management.
Network traffic and VPNs are inextricably linked to addressing congested traffic and bandwidth, including:
- Providing excess network bandwidth
- Securing the bandwidth
- Prioritizing traffic (service delivery)
- Providing static resource.
American Research Journal of Humanities Social Science (ARJHSS)R) 2019
ARJHSS Journal www.arjhss.com Page |68
4.2. Proposals and directions for development
With PKI infrastructure, deploying a single CA always meets the operational needs of an enterprise or
a medium-sized unit, ensuring flexibility and ease of deployment. However, with the requirement that when a
virtual private network system is scaled up for many users and linked to units outside the LAN system, a CA is
difficult to secure and manage safely. So it can be upgraded to a decentralized CA model with a CA as the
central control, each of which is a child CA.
Roaming issues between ISPs and the ability to combine MPLS with IPSec to extend VPN boundaries and
enhance VPN security.
The ability to apply IPv6 to VPN services and the ability to deploy internet infrastructure will increase the
ability to manage and distribute IPs in VPNs.
REFERENCES
[1]. Bàigiảng An toànvàBảomậtthông tin PGS.TS.NguyễnKhanhVăn, ĐạihọcBáchKhoaHàNội,
khóacaohọcCôngnghệthông tin 2012,.
[2]. Brian Komar, Windows Server 2008 PKI and Certificate Security, Microsoft Press, 2008.
[3]. Building and Managing Virtual Private Networks, Dave Kosiur, Wiley & Sons; ISBN: 0471295264.
[4]. Cryptography and Network Security Principles and Practices_ 4th Ed - William Stallings, Copyright
2006.
[5]. Mạngriêngảo: côngnghệvàtriểnkhaiứngdụng, Luậnvănthạcsỹ, NguyễnThạcThanhQuang, 2004.
[6]. Network Security Technologies, Second Edition, Kwok T. Fung, Auerbach publications, 2005.
[7]. Virtual Private Networking Basics – Conputer, By NETGEAR, Inc. All rights reserved, v1.0, October
2005.
*Corresponding Author: Le Ngoc Hoan
Thanh Hoa University of Culture, Sports and Tourism, Vietnam

More Related Content

What's hot

Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Pvrtechnologies Nellore
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesIRJET Journal
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsEswar Publications
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 

What's hot (20)

Amon cv 2016
Amon cv 2016Amon cv 2016
Amon cv 2016
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platform
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 

Similar to I266468

Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networksijtsrd
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformIRJET Journal
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of thingsRahul Tathod
 
Present Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignPresent Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignEvaObinna
 
AAP Part I DeliverableHere is the assignment to be comple.docx
AAP Part I DeliverableHere is the assignment to be comple.docxAAP Part I DeliverableHere is the assignment to be comple.docx
AAP Part I DeliverableHere is the assignment to be comple.docxannetnash8266
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPNIRJET Journal
 
Networking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptxNetworking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptxTETALAVENKATASIVARED1
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...IJECEIAES
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP Project
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
IRJET- Intelligent Home Security System using Artificial Intelligence
IRJET- Intelligent Home Security System using Artificial IntelligenceIRJET- Intelligent Home Security System using Artificial Intelligence
IRJET- Intelligent Home Security System using Artificial IntelligenceIRJET Journal
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?ssuser06ea42
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaebutest
 
Campus edge computing_network_based_on_io_t_street_lighting_nodes
Campus edge computing_network_based_on_io_t_street_lighting_nodesCampus edge computing_network_based_on_io_t_street_lighting_nodes
Campus edge computing_network_based_on_io_t_street_lighting_nodesEduardo Puertas
 

Similar to I266468 (20)

Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of things
 
WNA.pdf
WNA.pdfWNA.pdf
WNA.pdf
 
Present Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignPresent Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved Design
 
AAP Part I DeliverableHere is the assignment to be comple.docx
AAP Part I DeliverableHere is the assignment to be comple.docxAAP Part I DeliverableHere is the assignment to be comple.docx
AAP Part I DeliverableHere is the assignment to be comple.docx
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
 
Networking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptxNetworking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptx
 
Raghunathreddy Updated Resume
Raghunathreddy Updated ResumeRaghunathreddy Updated Resume
Raghunathreddy Updated Resume
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
IRJET- Intelligent Home Security System using Artificial Intelligence
IRJET- Intelligent Home Security System using Artificial IntelligenceIRJET- Intelligent Home Security System using Artificial Intelligence
IRJET- Intelligent Home Security System using Artificial Intelligence
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Campus edge computing_network_based_on_io_t_street_lighting_nodes
Campus edge computing_network_based_on_io_t_street_lighting_nodesCampus edge computing_network_based_on_io_t_street_lighting_nodes
Campus edge computing_network_based_on_io_t_street_lighting_nodes
 

More from American Research Journal of Humanities & Social Science

More from American Research Journal of Humanities & Social Science (20)

O49117143.pdf
O49117143.pdfO49117143.pdf
O49117143.pdf
 
N412114120.pdf
N412114120.pdfN412114120.pdf
N412114120.pdf
 
M41095107.pdf
M41095107.pdfM41095107.pdf
M41095107.pdf
 
F493852.pdf
F493852.pdfF493852.pdf
F493852.pdf
 
H4104461.pdf
H4104461.pdfH4104461.pdf
H4104461.pdf
 
J4127989.pdf
J4127989.pdfJ4127989.pdf
J4127989.pdf
 
J497785.pdf
J497785.pdfJ497785.pdf
J497785.pdf
 
I4127078.pdf
I4127078.pdfI4127078.pdf
I4127078.pdf
 
G4125261.pdf
G4125261.pdfG4125261.pdf
G4125261.pdf
 
J4107480.pdf
J4107480.pdfJ4107480.pdf
J4107480.pdf
 
K4108187.pdf
K4108187.pdfK4108187.pdf
K4108187.pdf
 
H4126269.pdf
H4126269.pdfH4126269.pdf
H4126269.pdf
 
H496771.pdf
H496771.pdfH496771.pdf
H496771.pdf
 
F4103238.pdf
F4103238.pdfF4103238.pdf
F4103238.pdf
 
A490108.pdf
A490108.pdfA490108.pdf
A490108.pdf
 
D4123036.pdf
D4123036.pdfD4123036.pdf
D4123036.pdf
 
I497276.pdf
I497276.pdfI497276.pdf
I497276.pdf
 
G495366.pdf
G495366.pdfG495366.pdf
G495366.pdf
 
G4114953.pdf
G4114953.pdfG4114953.pdf
G4114953.pdf
 
F4114248.pdf
F4114248.pdfF4114248.pdf
F4114248.pdf
 

Recently uploaded

Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖anilsa9823
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecSapana Sha
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenSapana Sha
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRDelhi Call girls
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Islam Fit
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYdizinfo
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 

Recently uploaded (20)

Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking Men
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 

I266468

  • 1. American Research Journal of Humanities Social Science (ARJHSS)R) 2019 ARJHSS Journal www.arjhss.com Page |64 American Research Journal of Humanities & Social Science (ARJHSS) E-ISSN: 2378-702X Volume-02, Issue-06, pp-64-68 June-2019 www.arjhss.com Research Paper Open Access Testing PKI and VPN infrastructure at the University of Culture, Sports and Tourism Le Ngoc Hoan - Vu ThiThuy Thanh Hoa University of Culture, Sports and Tourism, Vietnam *Corresponding Author: Le Ngoc Hoan ABSTRACT:- Public key infrastructure - PKI and a private network connection on a shared network (Virtual Private Network-VPN) shows great efficiency in security and information security for organizations, enterprise. Therefore, they have been researched and developed by many scientists and organizations for current network systems and services. Researching and testing PKI infrastructure, a virtual private network (VPN) applies to Universities ThanhHoa Culture, Sports and Tourism. The research focuses on research on PKI infrastructure and VPN on the basis of theory. After that, building on the testing environment is to build and connect on LAN system at 2 campuses of the school on windows server 2012. Keywords: Public key, PKI infrastructure, Virtual private network, Security, Safety and security. I. INTRODUCTION The development of security policies and mechanisms, security for systems and transmission lines is quite diverse and popular. In particular, the application of PKI infrastructure for the most common security and security issues is bringinggreat efficiency. Understanding and building PKI infrastructure in conjunction with VPN infrastructure are an approach for a new platform that we can deploy to test and apply to practice to improve managing efficiency in order to meet the needs of data access and applications for remote users via the internet. The research results can be applied to all branch offices, between offices need to exchange data with each other. II. IMPLEMENTATION REQUIREMENTS *Connection Designing requirements set out to build a secure connection system among facilities, units are far from the Center on the basis of making the most of available equipment and network infrastructure of the University of Culture, ThanhHoa Sports and Tourism. This system is compatible with current applications, flexible, compatible with various connection infrastructure such as ADSL, LeaseLine,. *Security To ensure a safe connection to the main building (establishment 1), it requires a solution: - Using modern security technologies. - Flexibly change security methods. - Supplementing security methods to ensure safety and security. *Administration Ensuring the continued operation of the network, the solution must design the monitoring software; administer the VPN Server system at the main facility. The software has the ability to monitor connections. Network administrators must fully and regularly capture information about configuration, problems and all data related to network usage. *Reasonable investment costs In order to make the solution feasible, in addition to technical requirements, security ... the investment cost is one of the most important requirements. When deployed with the model and the number of branches
  • 2. American Research Journal of Humanities Social Science (ARJHSS)R) 2019 ARJHSS Journal www.arjhss.com Page |65 connected to large start-up costs are huge. With the introduction of a reasonable investment solution, it will create favorable conditions for application in practice. III. RESEARCH METHODS 3.1. Selection model The test model is a remote virtual private network model using common software and available products currently that are being exploited on the network of the ThanhHoa University of Culture, Sports and Tourism. Remote access clients are personal computers with modems, the operating system of Windows XP or Windows 7, Windows 10, etc. The machine is configured as a VPN client. A server is a central machine installed with Windows server 2012. The server has 2 network interfaces, with routing and remote access services. In these two interfaces, an interface is used to connect to the internet via ethernet. The other interface is used to connect to the local network via ethernet with the IP address configured as a VPN server. Figure 3.1. Remote access network model Figure 3.2. Building network system at school to test PKI, virtual private network for ThanhHoa University of Culture, Sports and Tourism
  • 3. American Research Journal of Humanities Social Science (ARJHSS)R) 2019 ARJHSS Journal www.arjhss.com Page |66 Figure 3.3. Data flow diagram 3.2. Selecting tools, implementing installation - Using the operating system of Windows server 2012 installed on the Server machine; - Client machines using the operating systems of Windows XP, Windows 7 or Windows 10; - Routing routers; - Other necessary connection devices - Connection settings in the system: 1. Computer Server installed windows server 2012is setup PKI and VPN infrastructure, with 2 network interfaces. 2. Client machines in LAN network connect directly with a server that is located at the establishment 1. 3. Client machines outside the system are located at the establishment 2 connecting computers in the system at the establishment 1 by separate pipelines via the server with a separate policy. - Specific deployment: B1. Installing windows server enterprise 2012 on the server (the VPN server) B2. Installing Internal Client machines in the LAN network at the establishment 1 with the server. B3. Installing the External Client at the establishment 2 outside the LAN system - Set up a connection for Client and Server B4. Setting up Network Adapter for Internal Client; Setting up the IP address for connections in the system. B5. Setting up Network Adapter for External Client B6. Setting up Network Adapter for Server B7. Setting up VPN for users with their own policies B8. Setting up a VPN for the user (Client) B9. Setting up a policy for the user - Network policy and Access service B10. Setting up the Routing and Remote Access Service for the Client B11. Checking information the 1 Client connected to the system via the VPN created by the server B12. Setting up Remote Access for external clients B13. Testing client outside connecting data access to Client in the LAN system via VPN 4. Evaluating the effectiveness of research and system test deployment 4.1. These achievements For the purpose of the project "Testing PKI infrastructure, a virtual private network for the ThanhHoa University of Culture, Sports and Tourism". I have conducted research and presented research results on issues: *About infrastructure: - Material facilities for information technology are met to be able to deploy and build systems such as computers, transmission lines, and connected devices. - Having sufficient force of technicians and lecturers to ensure knowledge to participate in deploying and operating the system. - ADSL high-speed internet service uses a fiber optic transmission line, ensuring good transmission speed. Xửlývà lưutrữ DL Cácphòng ban củađơnvị Hệthốngbáocáoc hung BGHKếhoạchcôngcôn gviệc Hệthốngbáocáon ghiệpvụ Internet Cơ sở 2 Các ban QLDA Cơ sở 1
  • 4. American Research Journal of Humanities Social Science (ARJHSS)R) 2019 ARJHSS Journal www.arjhss.com Page |67 - Units: departments, faculties, and centers are fully equipped with computer systems, ensuring common configuration. *About models and options On the basis of application requirements set out: building applications of PKI infrastructure and virtual private network applied to the ThanhHoa University of Culture, Sports and Tourism. The first step is to identify the model of PKI architecturewith only one CA, which is applicable only to faculty members at centers, departments, and faculties of two campuses with a small number of visits. Therefore, the model is built with the following criteria and requirements: - The construction model is not too complicated and responsive to remote access, ensuring convenience and ensuring information security during exploitation and exchange, in accordance with general conditions and requirements in management and exchange of school information. - A model is a form of ensuring the convenience, quickness, security and information security for small and medium-sized units and organizations with the use of PKI infrastructure and virtual private network to reduce the cost; proactive in managing and operating information compared to using services of suppliers in the market. - The model can be developed and expanded when the system increases the need to use and scale the system or has plans to cooperate with units outside the school system. * Implementation policies and services for information security  IP address management The boom in the use of IP to transmit data, both inside and outside the network of companies, businesses, etc. leads to some problems in IP allocation and management. Initially, the IP address space is 32 bits (IPv4). However, The issue of dynamic IP has solved the allocation of IP addresses and routing, but it has complicated the construction of the VPN. IPSec is a protocol, which may be the most suitable for use with IPv6, but most of them must be compatible with IPv4 and have more mechanisms to solve problems. One solution to increase the IP address management space is the use of IP in a virtual private network (VPN) that remains connected to the public internet.  Building PKI security Currently, many virtual private networks (VPNs) are showing limitations because the security system itself is too simple. The problem is to be able to meet the requirements of developing a large and highly secure virtual private network. Most virtual private networks today are being exploited without the use of public key infrastructure (PKI). In the simplest way, it can be done by setting up the configuration at both ends of the VPN tunnel and sharing a common secret - a pair of passwords. Two VPN terminals can be authenticated through an electronic certificate - A kind of "electronic membership card" that is indispensable in large VPN networks. For electronic certificates, this organization is called a certification system (CA-Certification Authority). VPN networks use electronic certificates when the IP tunnel is initialized, the endpoints will authenticate each other through electronic certificates. Public key infrastructure will play an important role in successfully building large VPN networks.  Building a firewall A firewall is a solid barrier between a private network and the Internet. We can set up firewalls to limit the number of open ports, packet types, and protocols that are passed. The firewall will partition policy areas and set access policies for remote access to the system. This solution ensures control and policy settings for the VPN address space.  Management solution Management solution is indispensable for managing VPN network with a large number of connections. Administration and configuration work through the command line. This makes it difficult to monitor the connection to the system, make configuration for newcomers to access the system.  Quality of service management To coordinate various forces in the multi-service network, including the transmission of messages, online transactions, multimedia data,…createmany difficulties for bandwidth allocation and network management. Network traffic and VPNs are inextricably linked to addressing congested traffic and bandwidth, including: - Providing excess network bandwidth - Securing the bandwidth - Prioritizing traffic (service delivery) - Providing static resource.
  • 5. American Research Journal of Humanities Social Science (ARJHSS)R) 2019 ARJHSS Journal www.arjhss.com Page |68 4.2. Proposals and directions for development With PKI infrastructure, deploying a single CA always meets the operational needs of an enterprise or a medium-sized unit, ensuring flexibility and ease of deployment. However, with the requirement that when a virtual private network system is scaled up for many users and linked to units outside the LAN system, a CA is difficult to secure and manage safely. So it can be upgraded to a decentralized CA model with a CA as the central control, each of which is a child CA. Roaming issues between ISPs and the ability to combine MPLS with IPSec to extend VPN boundaries and enhance VPN security. The ability to apply IPv6 to VPN services and the ability to deploy internet infrastructure will increase the ability to manage and distribute IPs in VPNs. REFERENCES [1]. Bàigiảng An toànvàBảomậtthông tin PGS.TS.NguyễnKhanhVăn, ĐạihọcBáchKhoaHàNội, khóacaohọcCôngnghệthông tin 2012,. [2]. Brian Komar, Windows Server 2008 PKI and Certificate Security, Microsoft Press, 2008. [3]. Building and Managing Virtual Private Networks, Dave Kosiur, Wiley & Sons; ISBN: 0471295264. [4]. Cryptography and Network Security Principles and Practices_ 4th Ed - William Stallings, Copyright 2006. [5]. Mạngriêngảo: côngnghệvàtriểnkhaiứngdụng, Luậnvănthạcsỹ, NguyễnThạcThanhQuang, 2004. [6]. Network Security Technologies, Second Edition, Kwok T. Fung, Auerbach publications, 2005. [7]. Virtual Private Networking Basics – Conputer, By NETGEAR, Inc. All rights reserved, v1.0, October 2005. *Corresponding Author: Le Ngoc Hoan Thanh Hoa University of Culture, Sports and Tourism, Vietnam