Font Size: a A A

Researches And Applications Of IPSec Protocol In VPN

Posted on:2007-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhangFull Text:PDF
GTID:2178360212960716Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of computer networks, global communications with widespread open net environments have become the dominant trend in the future. But there are inevitably some potential security problems while the internet is providing open or shared resources. Currently security problems have threatened the so-called "net economy". How to protect the security of the internet, especially the security of the information transported through it, has become the focus people concern. Therefore, the research and development of widely-applied products on net information security is practical and valuable. While IPSec protocol is a good way to dispose the security of IP date's transferring. This paper discussed using the Internet Security protocol to construct a virtual private network instead of physical segregation. And how to design and construct a high throughout, more stability and secure VPN system is the goal of this design.This paper aims at further research on Virtual Private Network (VPN), a currently popular information security technique based on the IP Security protocol architecture (IPSec), and it's implementation. Firstly, this paper gave briefly introduction about VPN technology including development background, application field and some key technologies. Secondly, researched system on IPSec system structure, focused on AH/ESP protocol, including their format and position, gave their transact method, and, analyzed Internet key-exchange, security association database and security policy database. At last, considering the fact environment and the complexity of IPSec, improved the existing IPSec, brought forward an improved program, constructed the Nanjing-CRC enterprise network based on this program.The researches of this paper provide a method of realizing VPN by IPSec, and provide a new idea for making good use of IPSec in real application circumstance to ensure the communication security of VPN.
Keywords/Search Tags:VPN, IPSec, ESP, AH, Security Association Database, Security Policy Database
PDF Full Text Request
Related items