期刊文献+

电力企业VPN管控系统体系结构设计

Architecture Design of Management and Control System for Enterprise Virtual Private Network
下载PDF
导出
摘要 虚拟专用网络不仅具备低成本、良好的网络支持等特点,还具备租用专线的安全性优势,已广泛应用于拥有分支机构的大型企业。虚拟专用网络的管理已成为企业IT管理人员不得不认真面对的问题。文章在基于策略的网络管理、移动Agent等网络管理技术的基础上,提出了VPN管控系统架构。该架构能统一地管理包括VPN设备在内的网络设备,结合设备状态信息和预定义的管理策略,动态地实现全网管控,有效地帮助企业IT管理人员监控和管理企业VPN网络,优化网络资源的使用,减少维护工作的时间。 Virtual private network (VPN) not only possesses the low cost, inexpensive fees, and excellent support advantages of the Internet, it also has the benefit of the security as the leased line. How to properly manage the VPN is an issue which the enterprise IT engineers have to take seriously. This research is based on the new network management technologies such as policy-based network management, mobile Agent, etc., to design a VPN monitor and management system architecture. This system architecture integrates both VPN devices and general network devices, which can effectively assist the enterprise IT engineers to monitor and manage their enterprise VPNs in order to utilize the Internet resources, and to reduce the possible operation off time.
作者 陈昊
出处 《电力信息化》 2011年第12期26-30,共5页 Electric Power Information Technology
关键词 虚拟专用网络 移动代理 服务质量 监控 virtual private network (VPN) mobile Agent quality of service (QoS) monitoring
  • 相关文献

参考文献5

  • 1Gentry P B. What is a VPN[J]. Information Security Technical Report, 2001, 1(1) : 31- 34.
  • 2曲亚东,韦卫,侯紫峰.基于SNMP的VPN管理[J].计算机工程与应用,2003,39(15):167-170. 被引量:2
  • 3刘建峰,王翠茹,袁和金,韩立森.基于移动Agent的VPN服务监控及其质量的研究[J].华北电力大学学报(自然科学版),2004,31(1):88-92. 被引量:2
  • 4Nomura Y, Chugo A, Adachi M, et al. A policy based networking architecture for enterprise networks[J]. IEEE Int Conf Com- mun, 1999(1): 636-640.
  • 5Gunter M, Braun T. Internet service moni- toring with mobile agents [J]. IEEE Net- work, 2002, 16(3): 22-29.

二级参考文献22

  • 1Case J,McCloghrie K,Rose M et al.Protocol Operations for Version 2 of the Simple Network Management Protocol(SNMPv2)[S].RFC 1905, 1996-01.
  • 2M Oehler,R Glenn.HMAC-MD5 IP Authentication with Replay Prevention[S].RFC 2085,1997-11.
  • 3Kent S,Atkinson R.Security Architecture for the Internet Protocol[S].RFC 2401,1998-11.
  • 4Piper D.The Internet IP Security Domain of Interpretation for ISAK MP[S].RFC 2407,1998-11.
  • 5Maughan D,Schertler M,Schneider Met al.Internet Security Association and Key Management Protocol(ISAKMP)[S].RFC 2408,1998-11.
  • 6Harkins D,Carrel D.The Internet Key Exchange(IKE)[S].RFC 2409, 1998-11.
  • 7Case J,Mundy R,Partain D et al.Introduction to Version 3 of the Intemet-standard Network Management Framework[S].RFC 2570,1999-O4.
  • 8Harrington D,Presuhn R,B Wijnen.An Architecture for describing SNMP Management Frameworks[S].RFC 2571,1999-04.
  • 9Case J,Harrington D,Presuhn R et al.Message Processing and Dispatching for the Simple Network Management Protocol(SNMP)[S].RFC 2572,1999-04.
  • 10Blumenthal U,B Wijnen.The User-Based Security Model for Version 3 of the Simple Network Management Protocol(SNMPv3)[S].RFC 2574,1999-04.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部