期刊文献+

基于eNSP的端到端IPSec VPN实验设计与仿真 被引量:3

Design and Simulation of End-to-End IPSec VPN Experiment Based on eNSP
下载PDF
导出
摘要 目前的互联网普遍使用TCP/IP协议进行基础通信,而TCP/IP本身没有提供安全。数据在互联网传输的过程容易被伪造、篡改或者窥视。特别是企业或机构单位不同办公地点之间数据的传输要经过互联网,因此更要保护数据传输的安全。VPN是对企业内部网络的扩展,通过VPN可以帮助远程用户、企业或机构单位分支机构的内部网络建立可信的安全连接,并保证数据的安全传输。IPSec VPN可以有效地保护IP数据报的安全,它提供了一套健壮的安全机制,可为IP上层协议提供安全保障。文章研究IPSec技术原理和VPN隧道,分析并使用eNSP模拟器设计实现了IPSec VPN网络,并对网络进行实际测试。 At present, the internet generally uses TCP/IP protocol for basic communication, but TCP/IP itself does not provide security. The data on the progress of internet transmission is easy to be forged, tampered with or peeked at. In particular, the data transmission among different office locations of enterprises or institutions must pass through the internet, so it is more important to protect the security of data transmission. VPN is an extension of the internal network of an enterprise. It can help internal network of remote users,enterprises or the branches of institutions to establish reliable and secure connections, and ensure the safe transmission of data. IPSec VPN can effectively protect the security of IP datagrams. It provides a set of robust security mechanism, which can provide security for IP upper layer protocols. This paper studies the principle of IPSec technology and VPN tunnel, analyzes and uses eNSP simulator to design and implement IPSec VPN network, and tests the network in practice.
作者 陈展翅 王晓品 CHEN Zhanchi;WANG Xiaopin(Department of Electronics,Software Engineering Institute of Guangzhou,Guangzhou 510990,China)
出处 《现代信息科技》 2022年第24期69-71,共3页 Modern Information Technology
关键词 IPSEC 安全传输 VPN 网络实验 教学仿真 IPSec secure transmission VPN network experiment teaching simulation
  • 相关文献

参考文献4

二级参考文献17

  • 1KENT S. , ATKINSON R: RFC2401, Security Architec- ture for the Internet Protocol [ S ]. American : IETF: 10-11 [ 2014 ]. http ://www. de-editor, org/dc/dc2401, txt.
  • 2HARKINS D. , CARREL D: RFC2409, The Intemet Key Exchange (IKE) [ S ]. American : IETF: 5 - 8 [ 2014 ]. ht- tp ://www. rfc-editor, org/rfc/rfc2409, txt.
  • 3SCHILLER J: RFC4307, Cryptographic Alogrithms for Use in the Interact Key Exchange Version 2 (IKEv2) [ S ]. American: IETF :2-3 [ 2014 ]. http ://www. rfc-ed- itor. org/ffe/rfc4307, txt.
  • 4PIPER D: RFC2407 ,The Imernet IP Security Domain of Interpretation for ISAKMP [ S ]. UK: IETF : 9 [ 2014 ]. ht- tp ://www. rfc-editor, org/rfc/rfe2407, txt.
  • 5KAUFMAN C: RFCA306, Internet Key Exchange ( IKEv2 ) Protocol [ S ]. American: IETF :49-50 [ 2014 ]. http ://www. rfc-editor, org/rfc/rfc4306, txt.
  • 6PEREIRA R: RFC2451 ,The ESP CBC-Mode Cipher Al- gorithms [ S ]. American: IETF :4 [ 2014 ]. http ://www. rfc -editor. org/rfc/rfc2451, txt.
  • 7SCHNEIER Bruce. Applied Cryptography, Protocols, Al- gorithms,and Source Code in C [ M]. 2nd ed. Beijing: China Machine Press,2001:237-240.
  • 8KARA Orhun, MANAP Cevat. A New Class of Weak Keys for Blowfish [ C]//Fast Software Encryption. Lux- embourg: Springer, 2007 : 167-180.
  • 9HEYS H. M: Linearly Weak Keys of RC5 [ J ]. IEE E- lectronics Letters. 1997 (33) : 836-838.
  • 10FRANKEL S: RFC3602,The AES-CBC Cipher Algo- rithm and Its Use with IPsee [ S ]. American: IETF: 3 [ 2014 ]. http ://www. fie-editor, org/rfc/rfe3602, txt.

共引文献2

同被引文献22

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部