Implementation of Virtual Private Network based on IPSec Protocol

被引:0
|
作者
Wu, Jianwu [1 ]
机构
[1] Hubei Univ, Sch Polit & Law & Publ Adm, Wuhan 430062, Peoples R China
来源
2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009) | 2009年
关键词
VPN; Tunneling Protocol; IPSec; Authentication;
D O I
10.1109/FCC.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the four tunneling protocols which are commonly used in realizing the VPN (virtual private network), and analyses the characteristics and the appropriate case of each protocol. Basing on these description and analysis, the implementation of IPSec protocol by configuring the Windows 2003 Operating System and the implementation of IPSec protocol by using the Cisco equipments are introduced.
引用
收藏
页码:138 / 141
页数:4
相关论文
共 50 条
  • [31] Application Specific Tunneling Protocol Selection for Virtual Private Networks
    Jahan, Sohety
    Rahman, Md. Saifur
    Saha, Sajeeb
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 39 - 44
  • [32] Research on tunneling techniques in Virtual Private Networks
    Zhao, AQ
    Yuan, Y
    Ji, Y
    Gu, GQ
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 691 - 697
  • [33] Application of advanced encryption standard in virtual private networks implementation
    Behlilovic, Narcis
    Hadzialic, Mesud
    Mustafic, Adem
    Annual 2006 of the Croatian Academy of Engineering, 2007, : 207 - 225
  • [34] Moat: a virtual private network appliance and services platform
    Denker, JS
    Bellovin, SM
    Daniel, H
    Mintz, NL
    Killian, T
    Plotnick, MA
    USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), 1999, : 251 - 260
  • [35] On managing traffic over virtual private network links
    Ben-Yacoub, LL
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2000, 2 (02) : 138 - 146
  • [36] OSSEC Based Authentication Process with Minimum Encryption and Decryption Time for Virtual Private Network
    Jain, Ravi Kumar
    Trivedi, Prakriti
    2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 442 - 445
  • [37] VIRTUAL PRIVATE NETWORK-BASED PERFORMANCE IMPROVEMENT AGAINST JAMMERS IN IOT-BASED MANET
    Nourildean, Shayma wail
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2024, 19 (06): : 2107 - 2120
  • [38] Virtual Private Network over Wireless Mesh Networks
    Benzid, Djedjiga
    Kadoch, Michel
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 340 - 345
  • [39] Traffic masking in IPsec: architecture and implementation
    Kiraly, Csaba
    Bianchi, Giuseppe
    Formisano, Fabrizio
    Teofili, Simone
    Lo Cigno, Renato
    2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3, 2007, : 1343 - +
  • [40] The Implementation of IKEV2 for IPSec
    Yang, Xiaojin
    Liu, Jianhua
    CLOUD COMPUTING (CLOUDCOMP 2014), 2015, 142 : 175 - 180