WireGuard Based Secure Network Design to Protect Backend Access at Prolov Office
DOI:
https://doi.org/10.34010/incitest.v1i.826Keywords:
WireGuard, Virtual Private Network, Network Security, Backend AccessAbstract
This study is driven to develop and implement secure VPN network based on WireGuard for enhance the backend access in Prolov Office. Approach I am using in this post is experimental, including install and configure Wiregurd with easy-wg-quick, set up client peers, plus implementing firewall rules to restrict access to backend thru the VPN network. Testing was done with ping (latency) iperf3 (throughput), wireshark to verify packet encryption and nmap for external port scanning. "The results of our analysis indicate average latencies of 187–279 ms, which can be considered moderate but stable, a predictable throughput rate (constant bitrate) in the range of 4 Mbps, and all encrypted traffic without any sensitive data in plaintext. Security testing also confirms that the backend page can only be accessed through wireguard, and the backend ports (80 443) cannot be found from outside. In summary, the realization of WireGuard enhances the security of backend access, including encrypted data transmission, fine-grained access control and ease in deployment that is ready to be applied in aid of maintaining a modern enterprise network security.