Construction and Exploration of Corporate Virtual Private Networks

Article Preview

Abstract:

With the further development of Internet, VPN technology would provide high-quality and low-cost wide-area data network, and would be safer than the majority of corporate special network. Main purpose of VPN technology is to save communication expenses for enterprises, especially replace existing special lines of enterprises and reduce communication cost. With constant mergers and acquisitions of enterprises and the occurrence of new relationship between enterprises and employees, traditional corporate network mode faces challenges. One solution is to use virtual private network when constructing enterprise information environment. During network design, if only for simple point-to-point data transmission, making full use of transmission security is enough, security mechanisms such as encrypted tunnel, flows separating, packet authentication, user authentication, authorization system and access control etc have been taken to ensure the security. From perspective of engineering, comparison between the construction of corporate VPN and tunneling protocol that realizes VPN is made.

You have full access to the following eBook

Info:

Periodical:

Pages:

964-967

Citation:

Online since:

September 2012

Authors:

Export:

Share:

Citation:

[1] Zhang Dalu, Hu Xianfeng. Research on VPN Core Technology [J]. Computer Engineering, 2000, 3(1): 41-42.

Google Scholar

[2] Zhao Equn, Ji Yi, Gu Guanqun. Research on Tunneling Techniques Supporting VPN [J]. Journal of China Institute of Communications, 2000, 6(1): 85-90.

Google Scholar

[3] Sun Weiqing, Zhao Yiqun. VPN Tunneling Technology [J]. Application Research of Computers, 2000, 8(1): 55-57.

Google Scholar

[4] Chu Kuang. Network Security and Firewall Technology. Posts & Telecom Press, (2000).

Google Scholar

[5] Dai Chiyun. Virtual Private Network (VPN) Technology and Its Application in Enterprise WAN Connection. Modern Computer, 2000(8).

Google Scholar

[6] Wang Lina, Yu Ge, Mei Zhe et al. Chaotic Encryption Method of Multimedia Information in Virtual Enterprise [J]. Journal of Northeastern University (Natural Science), 2001, 22(4): 381-384.

Google Scholar

[7] Xiong Guixi, Wang Xiaohu. Computer Network [M]. Beijing: Tsinghua University Press, (2000).

Google Scholar