Font Size: a A A

Tunneling Technology And Its Application

Posted on:2002-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y N WangFull Text:PDF
GTID:2208360032456829Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
ABSTRACTTunneling is a method and generc mechanisms by which a packet is encapsulajed and carried as payload within an packet. The forwarding path between the source and destination of the tunnel packet is called a tunnel.This document introduces the basic idea of tunnel and the method by which an P datagram may be encapsulated and carried as payload within an P datagram.This document discusses the framework and the protocol operation of layer two tunneling protocol such as PPTP and L2TP which can extend the logical PPP session Over a shared infrastructure such as the lnternet.This document introduces Security Architecture for the Internet Protocol(lPSec).. IP Authentication Header (AH) .. lP Encapsulating Security Payload (ESP) and discusses how to create a safe tunneling.This document defines the Q0S (quality of service) which can describe the characteristic and the quality of service which tunneling provides. This document also describes a framework for Virtual Private Networks (VPNs) running across lP backbones and discusses the various different types of VPNs, their respective requirements, and proposes specific mechanisms that could be used to implement each type of VPN using tunneling proposed. L2TP tunnels PPP traffic over the lP and non-IP public networks. Therefore, both the control and data packets of L2TP protocol are vulnerable to attack. This document discusses how L2TP may utilize lPSec to provide for tunnel authentication, privacy protection, integrity checking and replay protection. Both the voluntary and compulsory tunneling cases are discussed. This document also describes an example using FreeSWAN 憀PSec to create a safe tunneling in LINUX.
Keywords/Search Tags:Tunneling, PPTP, L2TP, lPSec, Network Safety, VPN
PDF Full Text Request
Related items