Font Size: a A A

Research On Tunnel-Based Enterprise VPN Schemes

Posted on:2008-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:P C SunFull Text:PDF
GTID:2178360212974547Subject:Computer systems and structure
Abstract/Summary:PDF Full Text Request
At present,more and more corporations content various communicationdemand among their employees with the corporation or among the differentdepartments of the corporation through Internet.Employees may access the resource ofcorporation at any time and everywhere,different departments may exchangeinformations easily.This may emerge the network of the corporation at the unsafeenvironment.So we have to provide a safe access mechanism in order to ensure thesafety of communication and information.With the rapid development of electroniccommerce, Virtual Private Network(VPN) becomes more popular as a new kind ofInternet secure technique due to its simple, cheap, safe and reliable access to Internet. Atpresent, there are two improvement trends of VPN in view of technology, one is IPsecand the other is SSL.IPSec VPN ensures the safety of the communication through establishes a safetunnel between the two sides,but IPSec VPN isn't suitable for remote safe-access of thelarge number of mobile employees.SSL VPN can provides the access-control based onApplication Layer,moreover clients needn't install the special software and may beconfigured and managed more easier,so SSL VPN is fit for asfe-access for remoteemployees.The paper analyzes the architecture, mechanism and security protocols of VPN indetail. It pays more attention to compare and study VPN system based on IPsec or SSLrespectively, presents peculiarity and deficiency on system frame and networkssecurity.Then the paper demonstrates respective characteristics and differences betweenIPsec VPN and SSL VPN in view of system frameworks, security architecture andnetworks efficiency. Moreover, a rule of solution is put forward: IPsec VPN is used forthe realization of LAN to LAN safe communication.SSL VPN is used for the realizationof long-distance access.The paper expounds the configuration, protocol and authenticity of VPN.Meanwhile, describes the functions of each module and realizations in detail.
Keywords/Search Tags:VPN, IPSec, SSL
PDF Full Text Request
Related items