• A private network constructed on top of a public network, typically the Internet, is called a virtual private network, or VPN. Even though their communication may pass through a public network, computers inside a VPN can connect securely, exactly like if they were on a true private network that is physically isolated from the outside world. With the use of a VPN, staff members may safely access their company's intranet while on the go. Businesses can also use VPNs to extend their private networks domestically and internationally.
• The goal of this lab implementation is to understand how a VPN operates. We concentrate on a particular kind of VPN (the most popular one), which is constructed on top of the transport layer. We are going to construct a basic VPN from the ground up.
- Network Setup.
- Create and Configure TUN Interface
2.a: Name of the Interface
2.b: Set up the TUN Interface
2.c: Read from the TUN Interface
2.d: Write to the TUN Interface - Send the IP Packet to VPN Server Through a Tunnel
./dc-build.sh
- Build the docker images, it can take one additional parameter to be used in the build process../dc-up.sh
- Start the docker containers in the foreground../dc-up-d.sh
- Start the docker containers in the background../dc-stop.sh
- Stop the docker containers, it can take one additional parameter to be used in the stop process../dc-down.sh
- Stop and remove the docker containers, it can take one additional parameter to be used in the stop and remove process../dc-unittest.sh
- Utility script to aid in running a specific unit test class.
-
Virtual Private Network:
• The TUN/TAP virtual interface
• IP tunneling
• Routing