Policy-Based Management of a Secure Dynamic and Multipoint Virtual Private Network

Article ID

CSTNWSI6VNJ

Policy-Based Management of a Secure Dynamic and Multipoint Virtual Private Network

Ayoub Bahnasse
Ayoub Bahnasse University Hassan II
Najib El Kamoun
Najib El Kamoun
DOI

Abstract

Although IP VPN technology has recently been imposed because of its cost effectiveness and that several research studies have been proposed for centralized policy management of intra / inter VPN domain, most solutions are only addressed to VPN site-to-site technology, according to our researches no centralized management model based on a server for dynamic multipoint VPN networks was proposed. In this paper we propose a model “DMVPN Security Management System”for centralized policy management of dynamic multipoint multi-architectures VPN network, using a new web interface. We have implemented and tested the model on Single Hub Single Cloud architecture consisting of ten Spokes, the time required for an expert on VPN networks for manual set up of this architecture is an hour, we moved that to five minutes with our model, in addition to time effectiveness the margin error is null.

Policy-Based Management of a Secure Dynamic and Multipoint Virtual Private Network

Although IP VPN technology has recently been imposed because of its cost effectiveness and that several research studies have been proposed for centralized policy management of intra / inter VPN domain, most solutions are only addressed to VPN site-to-site technology, according to our researches no centralized management model based on a server for dynamic multipoint VPN networks was proposed. In this paper we propose a model “DMVPN Security Management System”for centralized policy management of dynamic multipoint multi-architectures VPN network, using a new web interface. We have implemented and tested the model on Single Hub Single Cloud architecture consisting of ten Spokes, the time required for an expert on VPN networks for manual set up of this architecture is an hour, we moved that to five minutes with our model, in addition to time effectiveness the margin error is null.

Ayoub Bahnasse
Ayoub Bahnasse University Hassan II
Najib El Kamoun
Najib El Kamoun

No Figures found in article.

Ayoub Bahnasse. 2014. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E8): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 14 Issue E8
Pg. 69- 76
Classification
Not Found
Article Matrices
Total Views: 8607
Total Downloads: 2183
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Policy-Based Management of a Secure Dynamic and Multipoint Virtual Private Network

Ayoub Bahnasse
Ayoub Bahnasse University Hassan II
Najib El Kamoun
Najib El Kamoun

Research Journals