Design and Implementation of Firewall to Inspect Traffic in Encrypted VPN Tunnels
Metadata[+] Show full item record
For the past 30 years, security is the greatest factor in internet and even in intranet. Starting from world war 1, we are striving to improve the security and now in 2019, we are confident enough to send the data security privately in public lines. We have built various kinds of firewalls which can inspect traffic at layer 2, 3, 4 and 7 of OSI model. These firewalls are robust enough and always have high availability build inside in case of failover events. We have various kinds of advanced cyphers which can pack the data tight enough so that no one can see or modify them. We use internet as private lines for sending data to others with the help of VPN tunnels. This change in technology made our life easy and cost effective. This technology helps us to be geo-independent, platform independent and resource independent. However, in most of the situations, we need monitoring over network to prevent attacks on our network. If the traffic is completely encrypted with latest algorithms, it’s not possible to monitor that. So, this thesis works presents a view and demonstration on how to monitor the traffic over encrypted tunnels and block it if necessary.
Table of Contents
Introduction -- Literature survey -- Firewalls, VPN and Open VPN -- Methodology -- Results -- Conclusion and future work -- Appendixix, 38 pages
M.S. (Master of Science)