Font Size: a A A

Based On The Isakmp Vpn Gateway And Client Design And Realization

Posted on:2007-08-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y CaoFull Text:PDF
GTID:2208360185483788Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The VPN makes use of the public network to build the Virtual Private Network, The public network which is used to build the VPN contains Internet, frame relay and TM etc .. It can use the Internet or the infrastructure of other public netways to establi sh the tunnel for the customer, and provide the safety, credibility and the function guarantees be similar with the appropriation network . As the electronic commerce activity increasingly multifarious, Some companies start allowing its business colleague, supplier to visit its enterprise business, makes the path of the information exchanges easier and consumedly, increase the speed of information exchanges. At the same time with the problem of the management, safeties. Currently the VPN mainly adopts four techniques to guarantee the safety: Tunneling, Encryption & Decryption, Key Management, Authentication. The paper mainly talks about the Key Management.The job of the Key Management is to deliver the key on the network save.Current the Technique of Key Management can be devided as SKIP and ISAKMP/O AKLEY. The SKIP is mainly makes use of the rule of Diffie- Hellman,deliver the key on the network.As the Isakmp both sides own two keys. There are few the research development of implement VPN based on the VPN method, accordingly this subject is bring forward.This paper deeply research the theory of IPSec protocols, the implement mechanism and system kernel struct, Designed on the foundation of the IPSEC VPN according to the ISAKMP VPN key management project. The thought of soft engineering is applied in the system development process of client and server, this subject analyze IPSec policy and the modul of the data stream process, and detailly account for the creation of certification and the implement of signature.
Keywords/Search Tags:VPN, ISAKMP, IPSEC, IKE, SA
PDF Full Text Request
Related items