ABSTRACT
The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost effective, fast, secure and reliable communications wherever their offices are. How do we ensure the safe passage of data across a shared infrastructure? The answer is to deploy a secured Virtual Private Network (VPN).
TABLE OF CONTENT
Title page
Approval
Dedication
Acknowledgement
Table of content
Abstract
CHAPTER ONE
1.0Introduction
1.1Background of the Study
1.2Objectives of the Study
1.3Significance of the Study
1.4Scope of the Study
1.5Limitations of the Study
1.6Definition of Terms
CHAPTER TWO
2.0Review of Related Literature
2.1Introduction
2.2Remote-Access VPN
2.3Site-to-Site VPN
2.4VPN Analogy: Each LAN is an Island
2.5Firewall-based
2.6VPN Security
¬2.7 Security Review of IPSEC and SSL VPNs
2.8IPSEC and IPSEC VPNs
2.9SSL and SSL VPNs
2.10Maturity and Acceptance
2.11Cryptography
2.12Client Desktop Integration
CHAPTER THREE
3.0Network Analysis and Design
3.1Introduction
3.2Data Communication Problem Faced by NBTE
3.3Project Scope
3.4 Objective of the VPN Design
3.5The Proposed VPN
3.6Conceptual Model of the Proposed Design
3.7 Physical Model of Proposed Design
3.8 Logical Model of the Proposed Design
CHAPTER FOUR
4.0Network Design Implementation
4.1Introduction
4.2ISP & Connectivity Provision
4.3Routers Interface IP Address Configurations
CHAPTER FIVE
5.0Summary, Conclusion, and Recommendations
5.1Summary
5.2Conclusion
5.3Recommendations
References
Appendix