You are on page 1of 5

ABDUL WALI KHAN UNIVERSITY MARDAN

PROFORMA FOR PROJECT PROPOSALS


OF AFFILIATED COLLEGES
(for undergraduate degree programs)
Implementation tunneling

Department of Computer Science


Govt/Private College Mardan Institute of Science & Technology

Academic Year/Semester: 4th semester

A. GENERAL INFORMATION
Student-1 Name: Abbas Khan Reg #: ____________________
Supervisor Name: Mr. Asad Ali Designation: Lecturer
Project Title: SITE-TO-SITE VPN CONFIGURATION ON CISCO ROUTER USING IPSEC

TUNNELING PROTOCOL

B. PROJECT ABSTRACT:

A Virtual Private Network (VPN) is a connection method used to add security and privacy to private and
public networks, like Wi-Fi. Hotspots and the Internet. It is mostly used by corporates to secure their data
over the public networks such as internet. As we know that there are increasingly simple methods to
intercept data traveling to a network. Wifi spoofing and Fire sheep are two easy ways to hack information.
VPN provide a security of confidential data over the web. Whenever a remote user wants to access the
corporate network outside the organization, VPN provide a secure connection between a remote user and
corporate network by using tunneling protocol such as IPsec. In this project, I will configure a site-to-site
VPN using IPsec tunneling protocol. With the help of VPNs all the data between remote user and
corporate network will be protected.

C. HOW VPN PROVIDE SECURITY?

 VPN can hide your browser history

 VPN can hide your IP address and location

 VPN can encrypt communication between communicating devices


 VPN can hide your location for streaming

 VPN can hide your device information

 Can hide you web activity

D. PROBLEM STATEMENT

Every corporate organization has a lot of activity associated with internet like sending and receiving
emails, payment transection, login credentials, personal browsing habits etc. Surfing the web or
transacting on an unsecured Wi-Fi network means you could be exposing your private information and
browsing habits as there are different ways to capture data by the hackers while it is sent over the public
networks such as spoofing etc. So it is desirable to have secure connection between you and your trusted
network to secure your confidential data while it is sent on untrusted network. To this end VPN come to
rescue us by providing a secure connection between communicating device and internet.

E. PROJECT OBJECTIVES

One of the primary objective of the project is to provide secure connection between communicating device
and corporate network.

F. REQUIRED TOOLS
 Cisco Packet tracer
 Routers
 Laptop
G. WORK SCHEDULE

Activity 2019-2020
Sep 2019 Oct 2019- Nov Dec Dec Jan 2020
2019 2019 2019

Collection of
Literature
Literature Review

Proposal Writing

Implementation

Thesis Write up

Thesis Submission
H. REFERENCES

1. Čabarkapa, D., 2015. Application of Cisco Packet Tracer 6.2 in teaching of advanced computer
networks. INFORMATION TECHNOLOGY AND DEVELOPMENT OF EDUCATION ITRO 2015,
p.153.
2. Adesemowo, A.K. and Kende, N., 2015. Students’ Learning Experience of ICT Networking via
Simulated Platform at a South African University. In IICE-2015 Proceedings (pp. 65-75).
3. Deal, R., 2009. Cisco ASA configuration. Tata McGraw-Hill Education.
4. Zanow, F. and Knösche, T.R., 2004. Asa-advanced source analysis of continuous and event-related
eeg/meg signals. Brain topography, 16(4), pp.287-290.
5. https://www.routerfreak.com/basic-configuration-tutorial-cisco-asa-5505-firewall/
6. https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/fwmode.html
7. http://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/964-cisco-asa5500-
startup.html
8. http://www.jaringankita.com/blog/step-by-step-configuration-guide-for-the-cisco-asa-5505-
firewall
9. https://www.networkstraining.com/how-to-configure-a-cisco-asa-5510-firewall-basic-
configuration-tutorial/
10. https://networklessons.com/cisco/asa-firewall
11. https://community.spiceworks.com/topic/1470299-initial-configuration-best-practices-on-cisco-
asa-5500-series
12. https://www.sans.org/reading-room/whitepapers/firewalls/perimeter-defense-in-depth-cisco-asa-
33028
13. https://it.toolbox.com/question/best-practices-to-setup-a-cisco-asa-5505-020810
14. https://www.dionach.com/blog/cisco-asa-firewall-hardening
Recommendation and Approval Process:
The title, supervisor, co-supervisor and abstract are recommended in the meeting attended by two internal faculty
members in the relevant department, one external expert from the concerned department of the AWKUM

Faculty member-1 Name ______________________________________ Signature_____________________

Faculty member-2 Name ______________________________________ Signature_____________________

External Expert (AWKUM): Dr.________________________________ Signature______________________

Approval by Dean_____________________(approved/Not-Approved)

Notification by the Director Academics if approved

You might also like