Implementation of Virtual Private Network based on IPSec Protocol

被引:0
|
作者
Wu, Jianwu [1 ]
机构
[1] Hubei Univ, Sch Polit & Law & Publ Adm, Wuhan 430062, Peoples R China
来源
2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009) | 2009年
关键词
VPN; Tunneling Protocol; IPSec; Authentication;
D O I
10.1109/FCC.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the four tunneling protocols which are commonly used in realizing the VPN (virtual private network), and analyses the characteristics and the appropriate case of each protocol. Basing on these description and analysis, the implementation of IPSec protocol by configuring the Windows 2003 Operating System and the implementation of IPSec protocol by using the Cisco equipments are introduced.
引用
收藏
页码:138 / 141
页数:4
相关论文
共 50 条
  • [21] A programmable network based approach for managing dynamic virtual private networks
    State, R
    Festor, O
    Nataf, E
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 393 - 399
  • [22] Realizing a Virtual Private Network using Named Data Networking
    Partridge, Craig
    Nelson, Samuel
    Kong, Derrick
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 156 - 162
  • [23] Virtual Private Network's Impact on Network Performance
    Nawej, Claude Mukatshung
    Du, Shengzhi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 577 - 582
  • [24] Research and implementation of MPLS VPN protocol based on network processor
    Wang YongJun
    Huang QingYuan
    WEBIST 2006: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 156 - +
  • [25] Secure virtual private network (VPN) over passive optical network (PON) based on network coding
    Li, Yan
    Chang, Xiangmao
    Journal of Computational Information Systems, 2013, 9 (09): : 3651 - 3658
  • [26] Research and Implementation of Security Wireless LANs based on EAP-TLS and IPSec VPN
    Zhou Li
    Tan Fang-yong
    Gao Xiao-hui
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 80 - 83
  • [27] Research on Security Solutions of Softswitch Network based on IPSec
    Mao, Jiangkun
    Xu, Yufeng
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1660 - 1663
  • [28] Performance Evaluation of Virtual Private Network Protocols in Windows 2003 Environment
    Narayan, Shaneel
    Kolahi, Samad S.
    Brooking, Kris
    de Vere, Simon
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 69 - 73
  • [29] Resource Management in Virtual Private Network Based on Predictor Model with Error Compensation
    Zhou Chunyue
    Dong Hairong
    Zhang Hongke
    PROCEEDINGS OF THE 29TH CHINESE CONTROL CONFERENCE, 2010, : 4197 - 4200
  • [30] An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes of Multi-level Classification
    Chen, Xun
    Liu, Jiqiang
    Shi, Yanfeng
    Han, Zhen
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 52 - 64