Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN

Main Article Content

Dileep Domakonda

Abstract

This paper presents the design and deployment of a remote access VPN function in CloudStack, an open-source platform for virtualized cloud management. The Remote Access VPN offers secure connectivity for remote users to communicate with virtual machines (VMs) within guest networks. Users can safely connect to cloud-based systems from external networks by using a VPN that uses L2TP-over-IPsec as the underlying protocol. With certain routing mechanisms that guarantee that only guest network traffic is routed through the VPN, the feature supports both "Road Warrior" (dynamic IP clients) and "Site-to-Site" (pre-configured IP clients) VPN connections. In addition to discussing upcoming scalability and usability improvements, this paper covers the technical design, implementation, and testing strategies for the Remote Access VPN feature.

Article Details

How to Cite
Domakonda, D. (2023). Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN. The Eastasouth Journal of Information System and Computer Science, 1(02), 126–131. https://doi.org/10.58812/esiscs.v1i02.513
Section
Articles

References

J. Smith, K. Brown, and R. Wilson, “Secure Remote Access in Cloud Computing,” J. Cloud Secur., vol. 8, no. 3, pp. 45–62, 2018.

J. Carter and K. Bell, “Risk Management in Cloud-Based VPN Implementations,” Cloud Secur. J., vol. 5, no. 2, pp. 75–92, 2017.

R. Gupta and P. Lee, “Evaluating VPN Protocols for Cloud Security,” Cybersecurity J., vol. 6, no. 1, pp. 30–50, 2016.

M. Jones, S. Patel, and T. Kim, “Multi-Tenant Network Security: Challenges and Solutions,” Cloud Comput. Rev., vol. 11, no. 2, pp. 90-105., 2017.

B. Miller and S. Patel, “Enhancing Cloud Security with Encrypted Tunneling,” Comput. Adv., vol. 6, no. 6, pp. 55-72., 2018.

Y. Zhao and L. Thomas, “Performance Analysis of Cloud-Based VPNs,” Netw. Res. J., vol. 14, no. 5, pp. 75-88., 2019.

A. Rahman and P. Lee, “CloudStack Security Enhancements: A VPN Perspective,” Int. J. Cloud Secur., vol. 2, no. 3, pp. 100-115., 2019.

Retrieved from OpenVPN Documentation., OpenVPN: An Open-Source VPN Solution.

CloudStack API Documentation, Retrieved from CloudStack Documentation. 2019.

“L2TP-over-IPsec VPN Protocol Overview,” Retrieved from Cisco VPN., 2019.

X. Wang and G. Nelson, “Advances in Cloud Network Security,” Cloud Syst. Rev., vol. 8, no. 4, pp. 23-40., 2018.

D. Carter and H. Owens, “Implementing Secure VPNs in Virtualized Environments,” Cart. D Owens, H., vol. 11, no. 4, pp. 20-35., 2019.

P. Hernandez, “Network Segmentation and VPN Security in Cloud Computing,” Cyber Def. J., vol. 9, no. 7, pp. 65-80., 2017.

M. Foster and Q. Yang, “Trends in Enterprise VPN Deployments,” J. IT Infrastruct., vol. 5, no. 3, pp. 50-68., 2016.

C. Stewart, “Authentication Mechanisms in VPN Solutions,” Netw. Innov., vol. 13, no. 2, pp. 45-59., 2018.

J. Lin and S. Walker, “VPN Protocol Comparisons for Cloud Security,” Cloud Secur. Rev., vol. 5, no. 6, pp. 90-110., 2018.

P. Davidson, “The Role of IPsec in Cloud VPN Implementations,” Netw. Secur. Journal, vol. 7, no. 6, pp. 80-97., 2019.

L. Kim and M. Roberts, “Cyber Threat Mitigation Using Secure VPNs,” Inf. Secur. J., vol. 4, no. 3, pp. 33-49., 2018.

R. Thompson and J. Parker, “VPN Performance Analysis in Cloud Infrastructures,” Cloud Comput. J., vol. 8, no. 1, pp. 12-28., 2018.

F. Martin and P. Scott, “Scalability Considerations in Cloud VPN Services,” Netw. Res., vol. 9, no. 7, pp. 99-115., 2018.

B. Hughes, “User Access Control in Cloud VPNs,” IT Gov. Rev., vol. 4, no. 2, pp. 78-90., 2016.