摘要
对分布在不同城市的跨城域大型公司而言,依托Internet构建公司内部私有专用网络是迫切所需。VPN技术就是在公用网络上建立专用网络并进行加密通讯,这种网络技术具有数据共享和数据传输的功能,其优势是具有安全性、稳定性、便捷性和扩展性,同时还可以提高企业或公司的网络管理水平,在企业网络中已经得到了广泛应用。但依托Internet构建的VPN网络在流量、稳定性和安全性方面依旧面临着许多威胁,MPLS是将IP技术与ATM技术融合的产物,更好地实现了路由选择和数据交换功能。它包含了第二层标记交换特点和第三层路由的特性,通过结合二层的数据链路协议和三层的路由转发技术,有效解决了当前网络状况下的数据分组转发问题。该文主要讨论在企业核心网络中使用MPLS VPN来实现不同业务部门之间的隔离与加密,以确保业务数据的信息传输安全。
For large cross-metropolitan companies distributed in different cities,it is urgent to build private networks within the company based on the Internet.VPN technology is to establish a private network on the public network and carry out encrypted communication.This network technology has the functions of data sharing and data transmission.Its advantages are security,stability,convenience and expansibility,and it also can improve the network management level of enterprises or companies,which has been widely used in enterprise networks.However,the VPN network built on the Internet still faces many threats in terms of traffic,stability and security.MPLS,as the product of the integration of IP technology and ATM technology,better realizes routing and data exchange functions.It includes the characteristics of Layer 2 Layer Label Switching and Layer 3 Routing.By combining Layer 2 Data Link Protocol and Layer 3 Routing and Forwarding Technology,it effectively solves the problem of data packet forwarding under current network conditions.We mainly discuss the use of MPLS VPN in enterprise core network to achieve the isolation and encryption between different business departments to ensure the security of business data transmission.
作者
圣文顺
周诚
孙艳文
SHENG Wen-shun;ZHOU Cheng;SUN Yan-wen(Nanjing Tech University Pujiang Institute,Nanjing 211200,China)
出处
《计算机技术与发展》
2020年第11期117-122,共6页
Computer Technology and Development
基金
国家重点研发计划重点专项(2017YFC0803700)
江苏省2019年度高校自然科学研究项目(19KJD520005)
江苏省2019年度江苏省大学生创新创业训练计划项目(201913905009Y)
南京工业大学浦江学院2018年度大学生创新创业训练计划项目(PJ201813905020)。
关键词
MPLS
VPN
企业专网
多协议标签交换
隔离加密
网络安全
虚拟专用网
MPLS VPN
enterprise private network
multiprotocol label switching
isolated encryption
network security
virtual private network