Document Outline - Introduction
- Analysis of requirements
- Architecture overview
- Customer Server
- Dispatch Server
- Routers
- Similar systems and existing tools
- Configuration management tools
- Current VPN Technologies
- Virtual Private Network
- OpenVPN
- IPsec
- SoftEther
- SmartCluster
- Tunneling scheme
- Configuration scheme
- Communication scheme
- Important differences
- Summary
- System design
- Tunneling scheme
- Setup
- Addresing
- Routing
- Online detection
- Authentication
- Firewall and groups
- Structure of iptables
- Group management
- Custom filtering rules
- Router management
- Communication protocol
- Set LAN operation
- Routing update operation
- Reconnect operation
- Retrieve configuration operation
- Security concept
- Certificate placement
- Initial actions
- Proxy
- Transaction system
- Database
- External API
- Pending configuration
- Execution of transactions
- Error handling
- Implementation
- External API
- User module
- Customer Server
- Dispatch Server
- Security measures
- “Pretending to be a CS” attack
- IP spoofing
- Stress tests
- Docker
- Fargate
- Router agents
- Setup
- Preparation
- Measurements
- Scenarios
- Results
- Conclusion
- Bibliography
Do'stlaringiz bilan baham: |