LINK:
https://www.idosr.org/wp-content/uploads/2022/11/IDOSR-JCAS-7195-1082022.-KIUP37.pdf
ABSTRACT
This study followed a descriptive pattern focusing on a point-to-point layer 2 design based on serial technology in relation to the efficiency in terms of cost, speeds, scalability and quality of service. The configuration of route exchange between PE and CE routers involved the implementation of a routing protocol (or static/default routes) on the CE routers. No specific configuration other than the regular routing protocol configuration was required on the CE routers. On the PE router, VRF routing contexts (or address family contexts) were required for route exchange between the PE and CE. Then, these routes were mutually redistributed with the MP-BGP process per VRF. The next tables show the steps that followed to configure the routers. We used the command sh ip route on the Customer Network to show the end-to-end connectivity between the CE routers within each VRF and their complete routing tables.
Keywords: Security analysis, virtual private networks, circuit switching
PUBLISHED
HOW TO CITE
Hamisi Sekiti and Adabara Ibrahim (2022).Security Analysis for Virtual Private Network Based on Site to Site Circuit Switching (Vpns2scs) Case Study: Liquid Telecommunication Ggaba. IDOSR JOURNAL OF COMPUTER AND APPLIED SCIENCES 7(1):95-108