Cisco Secured Virtual Private Networks: A Review


  • Yusera Farooq Khan Computer Science and Engineering, School of Engineering and Technology, Baba Ghulam Shah Badshah University, Rajouri, Jammu and Kashmir, India



confidentiality, authentication, hashing, security, sniffed


Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


M. Erwin, C. Scott and Wolfe, “Virtual Private Networks”, Sebastopol CA: O’Rielly & Associates Inc. 1999.

J. H Carmouche, “IPsec Virtual Prive Network Fundamentals” Indianapolis: Cisco Press , 2007.

J. S. Tiller, “A technical Guide to IPSec Virtual Private Networks” New York: Auerbach Publications, 2001.

V. C. Perta, M. V. Barbera, G. Tyson, H. Haddadi and A. Mei, “A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN Clients”, PETS, 2015.

D. Waitzman, C. Partridge and S. Deering, “Distance Vector Multicast Routing Protocol”, RFC1075, November, 1988.

S. Hanks, T. Li, D. Farinacci and P. Traina, “Generic Routing Encapsulation”, RFC1701, October 1994.

Baohong He, Tianhui, “Technology of IPSec VPN [M]”, Beijing: Posts & Telecom press, 2008, 7.

C. Metz, “The Latest in Virtual Private Networks: Part II,” IEEE Internet Computing, May – June, 2004.

K.Kompella, Ed., and Y. Rekhter Ed., “Routing Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)”, IETF L1VPN RFC 4202, October 2005.

H. Ould-Brahim and Y. Rekhter, “GVPN Services: Generalized VPN Services Using BGP and GMPLS Toolkit”, IETF L1VPN Internet draft, February 2005

S. Kent and R. Atkinson, “Security architecture for the Internet Protocol”, RFC (Standards Track) 2401, 1998

Venkateswaran, “Virtual private networks”, IEEE Potentials Magazine, Vol. 20, No. 1, Feb-Mar 2001.

H. Ould-Brahim and Y. Rekhter, “GVPN Services: Generalized VPN Services Using BGP and GMPLS Toolkit”, IETF L1VPN Internet draft, February 2005 330class/vpnpresentation.ppt

National Institute of Standards and Technology: Guide to IPSec VPNs (www.

CISCO VPN and VPN technologies,




IPSec and SSL decision Criteria, (

White Paper, “Virtual Private Networks: Improving Network Security for a diverse user community”. (

L. Phifer, Tunnel Vission: Choosing a VPN-SSL VPN vs IPsec VPN. ( sec-VPN), 2003

A. Hassan Pathan and M. Irshad, “IP Based Virtual Private Network Implementation on Financial Institution and Banking System”, pp. 30-34, 2014.

Root, Don and R. Rissler, “IPsec and SSL VPN Decision Criteria A Technology White Paper by Juniper Networks”, May, 1-13, 2006.

P.K. Singh and P.P. Singh, “A Novel approach for the Analysis & Issues of IPsec VPN”, International Journal of Sciences and Research,Vol. 2, No. 7, pp. 187-89, 2013.




How to Cite

Khan, Y. F. (2018). Cisco Secured Virtual Private Networks: A Review. Asian Journal of Computer Science and Technology, 7(2), 30–33.