Font Size: a A A

Design And Implementing Of Secure Authentication VPN Networks Based Radius

Posted on:2017-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:T W WangFull Text:PDF
GTID:2348330482498740Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of computer technology and network technology, computer network area developed two kinds of mainstream technology, ATM and IP networks. MPLS can effectively combines the advantages of the ATM technology and IP network techniques, thus it has very broad application prospects. Virtual Private Network (VPN) is a physical distribution network in different locations through public backbone networks, especially Internet connection and logical virtual subnet. In order to ensure the security of information, VPN technology adopts authentication, access control, confidentiality, integrity and other measures, in order to prevent the information leak, tampering and replication.In this thesis, a MPLS-based VPN network is implemented, and a Radius safety authentication server is built in the province center.The Radius security authentication system authenticates various kinds of user information, so the security and stability of the entire system is ensured. This thesis first introduces the research back ground and research significance, and introduces the basic principle of Radius agreement. The Radius protocol structure is analyzed in detail.The present development and basic principle of MPLS are Elaborated. The MPLS architecture is analyzed in detail. According to the advantages of using MPLS, this thesis puts forward VPN network construction measures and steps based on the Radius authentication security. The current network development of the province is analyzed briefly.We propose the construction scheme VPN based on MPLS.The rules of VRF, RD, Route, target rule, vlans, and equipment port connection of MPLS VPN are defined. The Radius server is established in the Linux environment. About routing protocol, we choose the OSPF protocol.So routing table is effectively reduced and the operation speed of the router is improved. Taking the OA system as an example, the network cutting over the VPN network construction principle and steps are presented.
Keywords/Search Tags:Radius, Secure authentication, VPN, MPLS, Routing protocol
PDF Full Text Request
Related items