Font Size: a A A

The Applied Research Of IPSec

Posted on:2009-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LiFull Text:PDF
GTID:2178360245496242Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Internet arouses global wave on information day by day now,and the application of network is more and more popular.Even deeper applications are carring out whose category is not only in little traditional business system but also in large ones.With the popularization of network,security becomes an important problem influencing the efficiency of network. TCP/IP is the base of communication among networks now,but there is no security on IP because IP packet may be forged or changed even peered. IPSec can protect IP packet by providing a standard vigorous and broad-contained system to solve the problems above. So we can use it to protect IP and other protocols (such as UDP and TCP).Most of ISPs adopt IPSec using technology of tunnel encryption, and provide new VPN service to commercial clients based on broad band.This technology becomes popular in commercial clients now for not only its broad band and cheap fee but also providing a safe and private data transmission service on VPN.The main contents of this topic include the principle and system of IPsec ,some basic research on VPN and the realization method of IPSec VPN.Then we create a practical IPSec VPN using the result above and test the network to verify its practicality and validity.The tests and analyses show that the inefficiency which occurred in the applicatio of the Internet has been overcome by IPSec VP design project, and also show that the Internet structures has been protected, then the protection of the investment of users has been maximized.On the other side, IP Sec technology assures the security the corporation local networks; Thousands of terminals can be linked to A company safely,simply,and assuringly so that companies can extend and expand the sales networks.
Keywords/Search Tags:IPSec, VPN, Information Security, Tunnel Encryption
PDF Full Text Request
Related items