Font Size: a A A

Based On The Ike Protocol Of Ipsec Vpn

Posted on:2006-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChenFull Text:PDF
GTID:2208360155459033Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of information technology and internet, there comes a lot of new techniques for network communication. VPN (Virtual Private Network) is one of these techniques, which implement the transportation of private data on the open network by tunneling technology and security configuration. Because of its security and reliability, VPN has attached more and more attention of people. IPSec (IP Security) is a group of security protocols, presented by IETF (Internet Engineering Task Force). IPSec can provide strong encryption and authentication for VPN communication. IKE (Internet Key Exchange) is the core of IPSec protocols. It is responsible for dynamic key negotiation and SA (Security Association) management.At the beginning, this paper introduced some principle and techniques of VPN and IPSec. Then, we did a detailed research of IKE, including the protocol framework, phases and modes of IKE exchange, key negotiation information. After that, the paper presented an architecture and feasible design of IKE. It described the design thoughts, modules, detailed approaches of negotiation, and design of two management tools. In the end, the paper gave out an improvement of IKE protocol.
Keywords/Search Tags:VPN, IPSec, SA, ISAKMP, IKE
PDF Full Text Request
Related items