Security Analysis for Virtual Private Network Based on Site to Site Circuit Switching (Vpns2scs) Case Study: Liquid Telecommunication Ggaba

AUTHOR

  • Hamisi Sekiti and Adabara Ibrahim

LINK:

https://www.idosr.org/wp-content/uploads/2022/11/IDOSR-JCAS-7195-1082022.-KIUP37.pdf

ABSTRACT

This study followed a descriptive pattern focusing on a point-to-point layer 2 design based on serial technology in relation to the efficiency in terms of cost, speeds, scalability and quality of service. The configuration of route exchange between PE and CE routers involved the implementation of a routing protocol (or static/default routes) on the CE routers. No specific configuration other than the regular routing protocol configuration was required on the CE routers. On the PE router, VRF routing contexts (or address family contexts) were required for route exchange between the PE and CE. Then, these routes were mutually redistributed with the MP-BGP process per VRF. The next tables show the steps that followed to configure the routers. We used the command sh ip route on the Customer Network to show the end-to-end connectivity between the CE routers within each VRF and their complete routing tables.

Keywords: Security analysis, virtual private networks, circuit switching

PUBLISHED

2022-11-21

HOW TO CITE

Hamisi Sekiti and Adabara Ibrahim (2022).Security Analysis for Virtual Private Network Based on Site to Site Circuit Switching (Vpns2scs) Case Study: Liquid Telecommunication Ggaba. IDOSR JOURNAL OF COMPUTER AND APPLIED SCIENCES 7(1):95-108

ISSUE

SECTION

Article