Font Size: a A A

The Research Of Multiple VPN Implementation Methods

Posted on:2003-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:G H QuFull Text:PDF
GTID:2168360092465441Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In nowadays, people have been accustomed to information exchange. To exchange information by computers, the network connection must be provided. In recent ten years, the technology and products of Local Area Network (LAN) and Wide Area Network(WAN) have been developed rapidly. With the popularization and great development of Internet, the Internet has become the main media of information exchange of people. Since the enterprises have already accustomed to exchange non-confidential information by Internet, they should naturally use Internet to send and receive highly confidential data. How to use Internet to implement WAN connection of remote users of enterprises has become the issue of people.Anciently, the DDN, FrameRelay and Dialing are the common WAN connection methods of enterprises. These methods are expensive and inconvenient. Since the inherent characteristic of opening of Internet, it has poor security. To transmit secret data by Internet,the technology of Virtual Private Network(VPN) has been provided. The newest encryption and authentication technology have been used in VPN.By VPN, the secret data is disposed and can be transmitted to the right receiver securely.The conception of VPN ,the basic principle of VPN and the relevant encryption technology will be researched in this thesis. With the concrete analysis of multiple implementation methods of VPN and the different requirement and different connection methods of enterprises,the different implementation methods of VPN will be researched and the proper implementation methods in different environment will be provided in this thesis.
Keywords/Search Tags:Virtual Private Network, Encryption, Authentication, IPSec, L2TP
PDF Full Text Request
Related items