Font Size: a A A

Design And Implementation Of VPN Based On L2TP

Posted on:2019-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:H E ChenFull Text:PDF
GTID:2428330596953528Subject:Computer technology
Abstract/Summary:PDF Full Text Request
At present,the application of VPN technology is more and more extensive,and its market is more and more broad.The research on VPN technology has good practical significance and economic value.The traditional private network is independent of the Internet.It is inflexible and expensive.If you need to add a new site in the private network,you need to re-plan the networking line.VPN is based on the Internet and builds a secure and reliable private data access channel on the Internet.Compared with the mode of traditional private networking,tunneling technology in VPN can be more flexible under the premise of ensuring the security of private data.At the same time,there is no need for dedicated line networking,and the cost is reduced much more.Therefore,more and more companies use tunneling technology in VPN.Currently,VPN technologies mainly include MPLS,GRE,IPSec,and L2TP.These technologies have their own advantages and are applicable to different scenarios.L2TP is one of the most widely used VPDN tunneling protocols.VPDN is a virtual private dial-up network service based on dial-up users,providing access services for enterprises,small ISPs,and mobile office workers.The functionality of L2TP can be described simply as establishing a peer-to-peer PPP session connection on a non-peer-to-peer network.The L2TP combines the advantages of the L2 F and PPTP protocols and becomes the industry standard for the Layer 2 tunneling protocol of the IETF.This topic takes L2TP as the research object.As far as I know,there are no much studies on L2TP,and most of the researcher focus on the theory,and the specific design and implementation of L2TP are less discussed.In this paper,the principle of L2TP is deeply analyzed,and the specific implementation scheme of L2TP in the router equipment system is designed.The overall design,interface design,data structure and implementation process of each associated module are provided.Finally,the module is loaded into the router by encoding and performs various functional tests to provide an implementation reference for the actual application of L2TP.
Keywords/Search Tags:VPN, Tunneling technology, VPDN, L2TP, Router, Design and implementation
PDF Full Text Request
Related items