期刊文献+

基于IPsec的站点间VPN部署方法 被引量:7

IPsec-based Site-to-site VPN Deployment Method
下载PDF
导出
摘要 在企业级的网络部署中,为了保证公司总部和分支机构的正常通信,同时为了节省开支,可利用互联网平台,采取加密通信的方式保证网络和通信安全。采用IPsec VPN实现站点间安全通信是有效的部署方法,分析IPsec的工作原理,简化拓扑模型,根据IP地址规划和相应的IKE策略,分步实施并进行验证测试,证明部署模型是正确的,验证了IPsec隧道通信是安全可靠的。 In enterprise-level network deployment,in order to ensure the normal communication between the company headquarters and branch offices,and to save costs,the Internet platform can be used to ensure network and communication security by means of encrypted communication.Using IPsec VPN to realize secure communication between sites is an effective deployment method.This paper analyzes the working principle of IPsec,simplifies the topology model,and implements step-by-step verification tests based on IP address planning and corresponding IKE policies to prove that the deployment model is correct,and the IPsec tunnel communication is safe and reliable.
作者 李春平 张淑荣 王东 韦立梅 肖亚光 LI Chun-ping;ZHANG Shu-rong;WANG Dong;WEI Li-mei;XIAO Ya-guang(Guangdong Baiyun University,Guangzhou 510000,Guangdong)
机构地区 广东白云学院
出处 《电脑与电信》 2022年第4期73-77,共5页 Computer & Telecommunication
关键词 加密 网络安全 IPSEC VPN 隧道 encryption network security IPsec VPN tunnel
  • 相关文献

参考文献8

二级参考文献36

  • 1陈穗光,葛建华.DRM系统的SHA256算法设计及FPGA实现[J].电子技术应用,2007,33(1):139-141. 被引量:2
  • 2S G Akl, P D Taylor. Cryptographic solution to a problem of access control in a hierarchy[J].ACM Transaction on Computer System, 1983,1(3) :239 - 248. 被引量:1
  • 3J Crampton, et al. On key assignment for hierarchical access control[ A ]. In Proceedings of the 19th IEEE workshop on Computer Security Foundations (CSFW' 06) [C]. Washington, DC, USA: IEEE Computer Society,2006.98 - 111. 被引量:1
  • 4Q Zhang, Y Wang. A centralized key management scheme for hierarchical access control[ A]. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM' 04 ) Vol. 4 [ C]. Dallas TX, 2004.2067 - 2071. 被引量:1
  • 5H R Hassen, A BouabdaUah, H Bettahar, et al. Key management for content access control in a hierarchy [ J ]. Computer Networks , 2037 , 51 (11) :3197 - 3219. 被引量:1
  • 6J C Birget, X Zou, G Noubir. Hierarchy-based access control in distributed environments[ A]. In IEEE International Conference on Communications ( ICC ' 01 ) Vol. 1[ C]. 2001. 229 - 233. 被引量:1
  • 7J Z Yan,J F Ma, H Y Liu. Key Hierarchies for Hierarchical Access Control in Secure Group Communications[J]. Computer Networks,2009,53(3) :353 - 364. 被引量:1
  • 8B Davey,H Priestley. Introduction to Lattices and Order[M]. Cambridge University Press, 1990. 被引量:1
  • 9F Harary. Graph Theory[M]. Reading, MA: Addison-Wesley, 1994. 被引量:1
  • 10W Diffie. New directions in cryptography[ J]. IEEE Transactions on Information Theory, 1976,22(6):644-654. 被引量:1

共引文献43

同被引文献51

引证文献7

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部