Font Size: a A A

The Researchand Implement Of The Remote Open Network Laboratory Based On L2TP And IPSec

Posted on:2009-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:D M YuFull Text:PDF
GTID:2178360272492755Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Today, with the rapid development of information and network technology, as well as theimprovement of new network technology, VPN technology has been used widely because of itsseveral virtues, such as safety, credibility, secrecy. It connects remote embranchment, businesscompanion and the mobile clerk by building private transmission passage through the opennetwork. Initially,VPN is designed mainly for the interconnection between LANs. However,with the necessity of doing the office work in either places and contacting people by usingremote communication,more and more people have found Access VPN more important.Access VPN can connect the terminal which locates external of company. At the same time, theexternal terminal can use the inner resource as the intramural user.Now, L2TP and IPSec are most extensively used in the study of VPN. On the base ofanalysing L2TP and IPSec protocol, this paper, adopts a scheme to carry out the Access VPNby combining the two.In general, the main work of this paper includes:(1)This paper expounds the relational knowledge of VPN. The kernel technology of VPNis tunnel, the paper compares the advantages and disadvantages of several protocols: PPTP,L2F, L2TP and IPSec.(2) Through the analysis and research of VPN protocol, this paper selects the second layerprotocol L2TP and the third layer protocol IPSec to construct the remote open networklaboratory.(3) This paper analyses the characteristic and function of remote Access VPN, andanalyses the hidden trouble of traditional remote Access VPN that based on L2TP protocol.Meanwhile, it points out the reason that restricts IPSec in constructing remote Access VPN. Thearticle comes to a conclusion----the combinatin of L2TP and IPSec can construct a safe VPN.(4) In allusion to the requirement of constructing the remote open network laboratory, thispaper selects the L2TP and IPSec protocol as the concentrated architecture, discusses thescheme in detail, and implements the scheme based on firewall.(5) This paper tests the example which uses L2TP and IPSec protocol, and analyses thetesting result.
Keywords/Search Tags:VPN, tunnel, encapsulation, L2TP, IPSec
PDF Full Text Request
Related items