V. PROTOCOL IMPLEMENTATION
IPSec can be implemented on the end hosts or in the gateways/routers or in both. Where in the network IPSec is deployed depends on the security requirements of the users [3].
Using the Open Source software GNS3 that simulates networks and with the Use of open Packet Analysing software Wireshark I’m creating a Site to Site virtual network and using IPsec to provide encryption between two sites (Routers) of the company and watch the behaviour of packets as data in it gets encapsulated by IPSec.
The Network includes:
3 Cisco routers running the c3600 ios: One of the routers serving as the internet cloud and two others serving as different company sites namely London and Northampton.