
T. S. SOBH ET AL.
Copyright © 2011 SciRes. JIS
41
on the Cisco Unified Client Framework, Cisco Easy
VPN centralizes VPN management across all Cisco VPN
devices thus reducing the complexity of VPN deploy-
ments [www.Cisco.com].
Cisco Easy VPN enables an integration of VPN re-
motes-Cisco routers, Cisco ASA & PIX Security Appli-
ances, Cisco VPN concentrators or software clients-
within a single deployment with a consistent policy and
key management method thus simplifying remote side
administ rat i on [w ww . Ci s co. com] .
eNetwork is IBM’s VPN Solutions [www.IBM.com].
Here we explain briefly the implementation of eNetwork
VPN and describe its value. It is based on IPSec. How-
ever, given the multitude of network environments and
business needs, all scenarios have not been addressed in
this section.
IBM added-value while many VPN solutions today
consist only of firewalls, IBM eNetwork VPN solutions
will also encompass multi-platform VPN-enabled clients
and servers, routers, and management functions [www.
IBM.com]. The advantages of IBM VPN solutions are:
scalability; flexibility of VPN function placement; and
the ability to have secure IP tunnels all th e way from the
client to IBM servers, where the majority of critical cor-
porate data resides today. Also, IBM VPN solutions can
be customized to be as secure or as flexible as required.
It provides capabilities that can link your IT assets with
Web technology to build secure e-business solutions
[www.IBM.com].
2.4. War Games and VPN
War game is a simulated battle between two or more
opposing fighting sides [3,4,14]. In most cases, there are
two fighting sides and they are represented by the red
and blue colors. Each side has its own goals to achieve at
the expense of the other side, considering each side ca-
pabilities, organization , weapons, and tactical experience
of management armed forces during the battle. In addi-
tion, environmental conditions such as battle terrain na-
ture, battle timing, weather, surrounding environment
must be considered. In addition to the fighting sides, one
more side representing the arbitrator must be existed in
the war game system. The arbitrator side is responsible
of monitoring the fighting sides and evaluates their deci-
sions.
Although it may be possible to play some forms of
war games without the use of any prepared materials,
most war games require a set of tools to keep track of
and display data, force locations and movements, and
interactions between opposing units. We have different
instrumentality of war games [3,4]:
Manual games, which represented by simple tools:
maps, charts, notebook of data, and orders of bat-
tles, perhaps a set of written rules and procedures
and all decisions are man-made.
Computer-assisted games use machines ranging
from desktop personal computers to very large
mainframes. The machines are used to keep track
of the force positions, their movement, weapon
capabilities, and other critical, data-intensive piec-
es of information.
Rand Corporation (fully automated) has been in the
forefront of an effort to extend the role of the
computer beyond that of capable assistant or some-
times opponent. This game is carried out com-
pletely on a computer, although usually with hu-
man intervention to issue orders.
The integrated software components for implementing
web based war games system of each side include: 1)
Operating system component 2) Database component 3)
GIS component.
Securing web based war games system is very impor-
tant. The main task is to achieve a high level of security
to the web based war game system [5] and controlling its
sides’ behaviors. Since the entire network packets are
going from or to the side LAN must be passed through
the gateway computer, the security process is activated
on the gateway computer. Encryption/decryption module
is responsible of doing two tasks [14,15]. The first task is
encrypting each network packet before going out from
the side LAN to the web. The second is decrypting each
network packet coming from the web before entering the
side LAN. This is why we use a VPN for securing web
based war games system. The main task of VPN here is
to achieve a high level of security to the web based war
games system and controlling its sides’ behaviors.
3. Proposed Model
As shown in Figure 3, this work provides three levels of
security to secure the web based war game system in the
following manner:
Access control module: the access control is applied to
our web based war game system using two access control
mechanisms. The first mechanism is the server operating
system access control mechanism. This mechanism is
applied to the war game system resources (directories,
files, printers …etc). The second mechanism is the
DBMS access control mechanism and it is applied to the
war game system database.
Virtual Private Network security module: this module
is responsible of doing two tasks. The first task is en-
crypting each network packet before going out from the
side LAN to the web. The second is decrypting each
network packet coming from he web before entering the t