NS LAB
NS LAB
RAMANATHAPURAM -623513
Department of Computer Science and Engineering
Name : …………………………………………………………….
Subject
Code : ………….……………………………………………
&Name
Register No
:…………...………………………………………………………
UNIVERSITY COLLEGE OF ENGINEERING
(A Constituent College of Anna University, Chennai)
RAMANATHAPURAM -623513
Department of Computer Science and Engineering
BONAFIDE CERTIFICATE
Register No.
Aim:
To write a Python program to implement the Symmetric key algorithms,
Algorithms:
Program:
i) DES
from Crypto.Cipher
import DES from Crypto.Random
import get_random_bytes from Crypto.Util.Padding
import pad, unpad key = get_random_bytes(8)
plaintext = b"Hello UCER CSE"
padded_plaintext = pad(plaintext, DES.block_size)
cipher = DES.new(key, DES.MODE_CBC)
ciphertext =cipher.encrypt(padded_plaintext)
decipher = DES.new(key, DES.MODE_CBC, iv=cipher.iv)
decrypted_data=unpad(decipher.decrypt(ciphertext),DES.block_size)
# Output the results print("Original Plaintext:", plaintext)
print("Ciphertext (hex):", ciphertext.hex())
print("Decrypted Plaintext:", decrypted_data)
ii) AES
from Crypto.Cipher
import AES from Crypto.Random
import get_random_bytes from Crypto.Util.Padding
import pad, unpad key = get_random_bytes(32)
plaintext = b"Hello AES!"
padded_plaintext = pad(plaintext, AES.block_size)
cipher = AES.new(key, AES.MODE_CBC)
ciphertext = cipher.encrypt(padded_plaintext)
decipher = AES.new(key, AES.MODE_CBC, iv=cipher.iv)
decrypted_data = AES.block_size) unpad(decipher.decrypt(ciphertext),
# Output the results
print("Original Plaintext:", plaintext)
print("Ciphertext (hex):", ciphertext.hex())
print("Decrypted Plaintext:", decrypted_data)
Output:
Result:
The python program for the symmetric key algorithm was implemented and executed successfully.
ExNo:2
Date: Implement the Asymmetric key algorithms and key
exchange algorithm
Aim:
To write a Python program to implement the Asymmetric key algorithms and key exchange algorithms.
Algorithms:
Key generation:
1. Select random prime numbers p and q, and check that p! =q
2. Compute modulus n=pq
3. Compute phi, ¢=(p-1)(q-1)
4. Select public exponente,1< e<¢. Such that gcd(e,¢)= 1
5. Compute private exponent d=e-1mod¢
6. Publickey is{n,e},private key is d
Encryption&Decryption
1.Encryption:c=memodn,
2.Decryption:m=cdmodn
3.Displaytheciphertextandplaintext.
Program:
i).RSA Algorithm
from Crypto.PublicKey
import RSA from Crypto.Cipher
import PKCS1_OAEP from Crypto.Random
import get_random_bytes
key = RSA.generate(2048)
private_key = key
public_key = key.publickey()
cipher_encrypt = PKCS1_OAEP.new(public_key)
plaintext = b"Hello RSA!"
ciphertext = cipher_encrypt.encrypt(plaintext)
cipher_decrypt = PKCS1_OAEP.new(private_key)
decrypted_data = cipher_decrypt.decrypt(ciphertext)
print("Original Plaintext:", plaintext)
print("Ciphertext (hex):", ciphertext.hex())
print("Decrypted Plaintext:", decrypted_data)
Output:
Result:
The python program for the Asymmetric key algorithm and key exchange algorithm
was implemented and executed successfully.
ExNo:3
Aim:
To write a java program to implement the Digital Signature Schemes.
Algorithm:
Program:
from cryptography.hazmat.primitives.asymmetric
import dsa from cryptography.hazmat.primitives
import hashes from cryptography.hazmat.primitives.asymmetric
import utils from cryptography.exceptions
import InvalidSignature
# Step 1: Generate DSA private key (used for signing) private_key = dsa.generate_private_key(key_size=2048)
# Step 2: Derive public key (used for verifying) public_key = private_key.public_key()
# Step 3: Message to be signed message = b"This is a secure message."
# Step 4: Sign the message using the private key signature = private_key.sign(
message,
hashes.SHA256()
)
print("Signature (hex):", signature.hex())
# Step 5: Verify the signature using the public key
try:
public_key.verify
Result:
Aim:
To observe the data transferred in client server communication using TCP/UDP and UDP
/ TCP data gram identification.
Steps:
• After downloading and installing wire shark, you can launch it and click the name of
an interface under Interface List to start capturing packets on that interface.
• For example, if you want to capture traffic on the wireless network , click your
wireless interface. You can configure advanced features by clicking Capture
Options.
• As soon as you click the interface‘s name , you‘ll see the packets start to appear in
real time. Wireshark captures each packet sent to or from your system.
• If you‘re capturing on a wireless interface and have promiscuous mode enabled in
your capture options, you‘ll also see other the other packets on the network.
• Click the stop capture button near the top left corner of the window when you want to
stop capturing traffic.
• Wire shark uses colors to help you identify the types of traffic a tag lance.
• By default, green is TCP traffic, dark blue is DNS traffic, light blue is UDP traffic,
and black identifies TCP packets with problems —for example, they could have been
delivered out-of-order.
OBSERVATIONOFCLIENTSERVERCOMMUNICATIONUSINGTCP/UDP:
By typing the ip address of client in filter box at top of the window in server’s
system and ip address of server in client system we can monitor the client server
communication
UDP/ TCPDATAGRAMIDENTIFICATION:
• If you‘re trying to inspect something specific, such as the traffic a program sends
when phoning home, it helps to closed own all other applications using the network
so you can narrow down the traffic.
• Still, you‘ll likely have a large amount of packets to sift through. That‘s where
Wireshark‘s filters come in.
• The most basic way to apply a filter is by typing it into the filter box at the top of the
window and clicking Apply(or pressing Enter). For example, type ―TCP‖ and you‘ll
see only TCP packets. , type ―DNS‖ and you‘ll see only DNS packets.
• When you start typing, Wire shark will help you auto complete your filter.
You‘ll see the full conversation between the client and the server.
Close the window and you‘ll find a filter has been applied automatically—Wire shark is
showing you the packets that make up the conversation.
Inspecting Packets Click a packet to select it and you can dig down to view its details
You can also create filters from here — just right-click one of the details and use the Apply
as Filter submenu to create a filter based on it.
Result:
Thus we observed the data transferred in client server communication using TCP/
UDP and UDP / TCP data gram was identified.
Ex:No:5
Date: Check message integrity and confidentiality using SSL
Aim:
To write a program for check message integrity and confidentiality using SSL.
Alogrithm:
### Ensuring Message Integrity:
1. *Hash Functions:*
- SSL/TLS uses cryptographic hash functions (e.g., SHA-256) to generate a message digest (hash) of the
transmitted data.
- The hash is sent along with the data.
- The recipient computes the hash of the received data and compares it with the received hash to ensure
integrity.
1. *Handshake:*
- ClientHello: The client initiates communication and provides supported cryptographic algorithms.
- ServerHello: The server selects a cipher suite and shares its digital certificate.
- Key Exchange: ServerKeyExchange (for DHE or ECDHE) or ServerKeyExchange (for RSA) is performed. -
Finished: Both parties confirm the handshake is complete.
2. *Key Derivation:*
- A pre-master secret is exchanged and used to derive encryption keys.
3. *Data Transfer:*
- Using the derived keys, data is encrypted and decrypted using symmetric encryption.
4. *Message Authentication Code (MAC):*
- HMAC is used for message integrity verification.
Program:
import socket import ssl import os from cryptography import x509 from cryptography.x509.oid
import NameOID from cryptography.hazmat.primitives
import hashes, serialization from cryptography.hazmat.primitives.asymmetric
import rsa
import datetime def generate_self_signed_cert(cert_file, key_file): if os.path.exists(cert_file) and
os.path.exists(key_file):
return key = rsa.generate_private_key(public_exponent=65537, key_size=2048) subject = issuer = x509.Name
([ x509.NameAttribute(NameOID.COUNTRY_NAME, "IN"),
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, "TN"),
x509.NameAttribute(NameOID.LOCALITY_NAME, "Campus"),
x509.NameAttribute(NameOID.ORGANIZATION_NAME, "College Lab"),
x509.NameAttribute(NameOID.COMMON_NAME, "localhost"),
])
cert =x509.CertificateBuilder().subject_name(subject).issuer_name(issuer).public_key(key.public_key()).
serial_number(x509.random_serial_number()).not_valid_before(datetime.datetime.utcnow()).
.not_valid_after(datetime.datetime.utcnow() + datetime.timedelta(days=365)).sign(key, hashes.SHA256())
with open(cert_file, "wb") as f:
f.write(cert.public_bytes(serialization.Encoding.PEM)
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
context.load_cert_chain(certfile=CERT_FILE, keyfile=KEY_FILE)
with socket.socket(socket.AF_INET, socket.SOCK_STREAM, 0) as sock:
sock.bind(('localhost', 4443))
sock.listen(5)
print("Server listening on port 4443...")
with context.wrap_socket(sock, server_side=True) as ssock:
conn, addr = ssock.accept()
print("Connection from", addr)
data = conn.recv(1024).decode()
print("Received:", data)
response = "Secure message received. Integrity OK."
conn.send(response.encode())
conn.close()
Output:
Result:
The python program for check message integrity and confidentiality using SSL was executed
Successfully.
Ex:No:6(i)
Aim:
To write a python program for simulating dictionary attack on password.
Algorithm:
• Python program that simulates a dictionary attack on a password by trying
out a list of commonly used passwords and their variations.
• We first define a list of commonly used passwords and their variations.
• We then define the hash of the password we want to attack (in this
example, "mypass12#@"is hashed using SHA-256).
• We then use a nested loop to try out all possible combinations of common
passwords and their variations.
For each combination, we hash the password using SHA-256 and check if it matches the hashed
password we want to attack.
• If a match is found, we print the password and exit the loop. If no match is
found, we print a message indicating that the password was not available.
Program:
Def eavesdrop_conversation(conversation): for message in conversation:
print(message)
conversation = ["Hey, how's it going?", "Not bad, you?", "I'm good, thanks!"]
eavesdrop_conversation(conversation)
Output:
Result:
Thus python program for simulating dictionary attack on password was executed
and output was verified successfully.
Ex:No:6(ii)
Date: Experiment Dictionary Attack
Aim:
To write a python program for simulating dictionary attack on password.
Algorithm:
• Python program that simulates a dictionary attack on a password by trying
out a list of commonly used passwords and their variations.
• We first define a list of commonly used passwords and their variations.
• We then define the hash of the password we want to attack (in this
example, "mypass12#@"is hashed using SHA-256).
• We then use a nested loop to try out all possible combinations of common
passwords and their variations.
For each combination, we hash the password using SHA-256 and check if it matches the hashed
password we want to attack.
• If a match is found, we print the password and exit the loop. If no match is
found, we print a message indicating that the password was not available.
Program:
common_passwords=[“password”,”password123”,”letmein”,”qwerty”,:123456”,”abc123”,”admin”,”
welcome”,”monkey”,”sunshine”]
password_variations=[“”,”123”,”1234”,”12345”,”123456”,”!”,”@”,”#”,”$”,”%”,”^”,”&”,”*”,”(“,”)”,”
-“,”_”,”+”,”=”,”/”,”\\”,”|”,”[“,”]”,”{“,”}”,”>”,”<”,]
#Hashofthepasswordtobeattacked
hashed_password= hashlib. sha256(b"mypass12#@").
hexdigest()
#Try out all possible combinations of common passwords and their variations for password in
common_passwords:
Result:
Thus python program for simulating dictionary attack on password was executed
and output was verified successfully.
Ex:No:6(iii)
Date: Experiment MITM attacks
Aim:
To write a python program to implement Man In The Middle Attack
Algorithm:
Step5:
If Alice uses S1 as a key to encrypt a later message to Bob, Malory can decrypt it,
re-encrypt it using S2, and send it to Bob. Bob and Alice won’t notice any problem andmay
assume their communication is encrypted, but in reality, Malory can decrypt, read, modify,
and then re- encrypt all their conversations.
Program:
importrandom
def compute_secret(self,
gb): # computing
secret key return
(gb**self.n)%p
classB:
definit(self):
# Generating a random private number selected for
alice self.a = random.randint(1, p) #
Generating a random private number selected
for bob self.b = random.randint(1, p)
self.arr=[self.a,self.b]
defpublish(self,i): #
generating public
values return
(g**self.arr[i])%p
alice=A(
) bob =
A()
eve=B()
# Generating public
values ga =
alice.publish() gb =
bob.publish() gea =
eve.publish(0)
geb=eve.publish(1
)
print(f'Alice published (ga):
{ga}') print(f'Bob published
(gb): {gb}') print(f'Eve published value
for Alice (gc): {gea}') print(f'Eve
published value for Bob
(gd): {geb}')
#Computingthesecretkey
sa =
alice.compute_secret(gea) sea
= eve.compute_secret(ga,0)
sb =
bob.compute_secret(geb) seb
= eve.compute_secret(gb,1)
print(f'Alicecomputed(S1):
{sa
}')
print(f'Eve computed key for Alice (S1) : {sea}')
print(f'Bob computed (S2) : {sb}')
print(f'EvecomputedkeyforBob(S2):{seb}')
Output:
Result:
Thus python program for simulating MITM attack on password was executed and
output was verified successfully.
Ex:No:8
Date: Demonstrate intrusion detection system using tool(ids)
AIM:
INSTALLATION PROCEDURE:
1. Download SNORT fromsnort.org
2. Install snort with or without database support.
3. Select all the components and Click Next.
4. Install and Close.
5. Skip the Win P cap driver installation
6. Add the path variable in windows environment variable by selecting new class path.
7. Create a path variable and point it at snort .exe variable name path and variable value
c:\snort\bin.
8. Click OK button and then close all dialog boxes. 9. Open command prompt and type
the commands.
STEPS:
C:\Snort\bin\snort–vd
C:\Snort\bin\snort –dev–l c:\log
C:\Snort\bin\snort–dev–lc:\log–hipaddress/24
C:\Snort\bin\snort–lc:\log–b
snort–d–hipaddress/24–lc:\log–csnort.conf
Result:
Thus intrusion detection system was studied using snort.
Ex:No:9
Date: Explore network monitoring tools
Aim:
To explore network monitoring tools.
Pros
• Up time reporting
• Real-time monitoring
• The network is accessible through mobile
• Multi-user collaboration
Cons
3. Auvik
Platform:Web-based
Auvikis a faster, easy-to-use, cloud-based network monitoring software giving you
instant insight into the networks you manage with automated network discovery,
monitoring, documentation, and much more. This networking performance monitor
tool provides real- time network mapping and inventory, keeping you constantly
updated.
Key feature
Cons
4. NetworkBandwidthAnalyzer
Platform: Windows & Linux
Network Bandwidth Analyzeris a multi-vendor network monitoring tool that allows
you to monitor the network’s performance. Detecting, diagnosing, resolving the network
performance issues allows you to use the network more effortlessly
Key features:
• Quickly detects, diagnoses ,and resolves the network performance issues, reducing the
network outrages.
• Easily view IPv4 and IPv6 flow records.
• You can easily Monitor Cisco Net Flow,JuniperJ-Flow,sFlow,HuaweiNetStream,and IPFIX
flow data identifying the applications and protocols consuming the most bandwidth.
• Immediately shows alerts if there is any change in the application traffic activity.
• Easily set alerts if the network monitoring software stops sending you network performance
data.
• The Analyzer collects all the traffic data and converts it into a useable format by which you can
easily monitor the network traffic.
• VM ware Sphere distributed switch support, by which it can filter out east-west traffic on
specific hypervisors.
• Justdragginganddroppingthenetworkperformancemetricsonacommontimeline accelerates the
process of identifying the root cause.
• The software supports the Cisco NBAR2, which provides visibility into HTTP (port 80) and
HTTPS (port 443) traffic without additional probes, spanning ports, etc.
• Easilycreateaschedule,anddeliverin-depthnetworktrafficanalysisandbandwidthreports.
• Thisisoneofthebestfreenetworkmonitoringtoolswhichsupportswirelessnetwork monitoring and
management.
• With CBQoS policy optimization, you can measure the effectiveness of pre-and post-policy
traffic levels per class-map
• Freetrial:Yes,30daysfullyfunctionaltrial.
Pros
□ IthasamobileversionsupportedbyAndroidand
iOS.
□ Networkmonitoringisdone24×7
Pros
□ IthasamobileversionsupportedbyAndroidand
iOS.
□ Networkmonitoringisdone24x7
□ Itsupportsover450vendorslikeCanon,HP,Cisco,D
- link,Dell,etc. Usesreal-
timedatatodiscoverdevices.
User-friendlynetworkmonitoringtool
Cons
5. NetworkPerformanceMonitor
Platform: Windows & Linux
TheNetwork Performance Monitor software helps in saving time and improving the
network security and reliability by managing configurations, compliance for routers,
switches, and other networks, etc.
Key features:
• Ensure high network reliability and uptime with automated backup schedules for routers,
firewalls, and switches.
• Offersfullyautomatedconfigurationformostmanagednetworkdevices.
• Youcan easily view, deploy,track, and backup all the network device configurations fromone
location.
• Providesafastanderror-freeexecutionofconfigurationchanges.
• Youcanidentifythedifferencesinlinesofcodewiththeconfigurationcomparisonfeature.
• Itmaintainstheconfigurationdatabase,whichcanhelpyouinthefuturewithsecurity
misconfigurations.
• Efficientlymanagetheroutersandavoidsecuritymisconfiguration.
• Easilycreatemulti-device-basedbaselineconfigurationsgivingyouareferencepoint.
• Throughtheproactivedriftmanagementfeature,youcanimproveoperationalefficiency.
• Withanetworkinventorytool,youcanincreaseproductivityandsave time.
• Import existing devices, irrespective of the device type, and automatically update your device
information whenever it changes.
• Freetrial:Yes,30-daysfreetrial
□
Pros
• Itisamulti-vendorinventorysoftware
Itquicklyresolvesnetworkissues.
• Simplifyandimproveyournetworkcompliance
• Itautomaticallyidentifiesvulnerabilitiesandleveragesthem.
□ ItiscompatiblewithotherSolarWindsmodules.
Cons
□ Itischallengingtotrackallthechangesintools.
6.BetterStack
Platform:Web-basedandCloud-based
• Realtimeobservabilitydashboards
• Actionablethresholdalertingbasedondifferenthosts
• Simpleintegrationwithyourstack
• Out of the box integrations: Datadog, New Relic, Prometheus, Zabbix, AWS, Azure, Google
cloud platform, Slack, Microsoft Teams and more
Uptime,Ping,HTTPS,SSL&TLDexpiration,DNS,Cronjobschecksandmore
30-secondsmonitoringfrequency
Incidentmanagementandon-callalertingbuilt in
• Licensing:Cloud-based
• Price:Freeplanavailable Freetrial:Yes(60daysfree trial)
Pros
• Integratedstatuspagesforincidentcommunication
• Unlimitedon-callalertingonallpaidplans
• Powerfuloutoftheboxintegrations
Cons
□ LimitedDNSmonitoringoptions
6. Obkio
Platform:Linux,Windows,Mac iOS
Obkio’sNetwork performance monitoring and SaaS solution software helps you to
identify the issues and resolve them to deliver an improved end-user experience. It is one of the
best network monitoring tools that provide real-time network performance updates every 500ms
Key features:
• ContinuousmonitoringusingmonitoringAgents
• ExchangeofSyntheticTraffictomeasureperformance
• MonitoringfromtheEnd-User perspective
• Decentralizedmonitoringbetweenpairsofagentsindifferent locations
• Thisnetworkperformancemonitoringtoolprovideshistoricalperformancetotroubleshoot past
issues
• AutomaticSpeedTeststoassessnetworkhealth
• UserQualityofExperience(QoE)ismeasuredeveryminute
□
Enable SNMP device monitoring so that you can monitor firewalls, CPU, switches, routers, and
much more.
SaaSapplicationallowsstoringinformationinthecloud,makingitusefulandeasytosetup.
• Freetrial: 14-dayfreetrial
Pros
• Deploysinminutes
• Troubleshootintermittentperformanceissues.
• Themonitoringagentsaresupportedbyeverysystem,Windows,Linux, Hyper-V,and more.
• InplaceswithnoITservers,youcanusehardwareagentsavailableinplug-and-play.
webandmobileappisavailable
Cons
□ Doesnotofferawiderrangeof Integrations
7. Paessler PRTG
Platform:Windows,Mac,Linux,Android,andiOS
PRTGnetwork monitoring software is known for its advanced infrastructure
management capabilities. Its user interface is very powerful and is the best fit for
organizations with low experience in network monitoring. This is one of the best free
network monitoring tools that supervises the entire IT infrastructure using advanced
technologies like SNMP, WMI, HTTP requests, Pings, SSH, and much more.
Key features:
• Completelymonitorsallthedevices,systems,andtrafficinyourIT infrastructure.
• Thisfreenetworkingmonitoringsoftwaresupportsmulti-sitecapabilities.
ComprisesofSNMPsensorsthatgatherdevicehealthinformation
ThePingfeatureenablesyoutocheckthedevice’shealth information.
Itcontainsextrasensorstomonitorserversand applications.
• Itmonitorsspecificdatasetsfromyourdatabasewith individuallyconfiguredPRTGsensors.
• Entirelymanagesandprovidesdetailedstatisticsofalltheapplicationsrunninginyour network.
• Monitorsalltheserversinreal-timewithregardtotheiraccessibility,availability,and capacity.
• SupervisingforLANsaswellasforwirelessnetworks.
• Itoffersauto-discoverybywhichyoucancreateandmaintainadeviceinventory.
• TheLivetopologymapsinarangeofformatsare available.
• Ithasaprotocolanalyzerthatidentifieshigh-trafficapplications. Freetrial:30-dayfree trial.
Pros
• Thedashboardcontainscolor-codedgraphsoflivedatainyournetworkmonitoringsystem.
• Therearenoadditionalpluginsordownloads;everythingisincludedinPRTG. Itisaneasy-to-
usesolutionforallbusinesssizes.
• ItmonitorsadiverserangeofdeviceswithSNMP
• Itoffersafreeversion
• IthasawiderangeofalertmediumslikeSMS,emails,andanythird-partyintegrations.
Cons
□ Ithasanenormousrangeoffeaturesthatrequiretimetoclearlyunderstand.
Result:
Thus various network monitoring tool have been explored successfully
Ex:No:10(i)
Date: Study to configure Firewall
Aim:
To study the Configuration of firewall on windows.
Configuring Firewall Defender on Windows: Step1:LaunchStartfromthetaskbar.
Step2:Search“Settings”inthesearchbarifyoudonotfindtheSettingsiconin
Startmenu.
Step3:IntheleftpaneofSettings,clickPrivacy&security.
Step4:ClickWindowsSecurityoptioninPrivacy&securitymenu.
Step5:SelectFirewall&networkprotection.
Step 6: Now Window’s Security window will pop up window’s. Here you can verify whether your
Defender firewall is active or not.
Step7: Nowtoconfigurethefirewallaccordingtoyourrequirement,click
Advancedsettings.
YouwillbepromptedbyUserAccountControltogiveAdministrativeaccesstoWindows Defender to
make changes. Click Yes to proceed.
Step 8: Windows Defender Firewall with Advanced Security window will launch after giving
administrative permission.
Step9:Theleftpanehasseveraloptions:
• Inboundrules:Programs,processes,portscanbeallowedordeniedtheincoming
transmission of data within this inbound rules.
• Outboundrules:Herewecanspecifywhetherdatacanbesentoutwardsbythat program,
process, or port.
Step 10: To add a new inbound rule, select Inbound Rules option, then click New Rule… from the
right panel.
move Next
Deleted.
Ex:No:10(ii)
Date: Configuring VPN
Aim:
Study to Configure VPN (Virtual Private
Network)
3. SelectVPNfromtheleftmenu,thenattheright,clickAddaVPNconnection.
4. Inthedialogboxthat opens
5. Inthedialogboxthat opens
6. SetConnectionname.Forexampleto"UWSPVPN"
7. SetServernameoraddress.ForExample"vpn.uwsp.edu"
8. ClickSave
9. SelectChangeadapteroptions
10. Right-clickUWSPVPNandselectProperties.
11. In the UWSP VPN Properties box select the Networking tab.Select Internet Protocol Version 6and click
Properties.
12. ClickAdvancedontheInternetProtocolVersion6Propertiesboxthatopens.
“uwsp.edu”(noquotes).Note,"AppendtheseDNSsuffixes"mayinsteaddisplayhere.
Click OK.
Click OK to the Internet Protocol Version 6 Properties box. This returns you
to the UWSP VPNProperties box.
IntheUWSPVPNPropertiesboxnowselectInternetProtocolVersion4andclickProperties.
ClickAdvancedontheInternetProtocolVersion4Properties box.
IntheAdvancedTCP/IPSettingsboxontheIPSettingstab,uncheck“Usedefaultgateway…”.
Click OK.
ClickOKtotheAdvancedboxandOKtotheInternetProtocolVersion4Properties box.
You have now disabled the default gateway for both Internet Protocol Version 6 and version 4.
Your UWSP VPN should be configured.
TostartaUWSPVPN connection
1. ClicktheWindowsStartbuttonandselectSettings.
2. UnderWindowsSettings,selectNetwork& Internet.
3. SelectVPNfromtheleftmenu,thenattheright,click"UWSP VPN".
4. Click"Connect"andloginwithyourUWSPusernameandpassword.Youwillbeaskedto
authenticate with
MFA.
Result: