OPNET-Based Computer Simulation of MPLS VPN Security Solutions

Article Preview

Abstract:

This paper features of IPSec and MPLS technologies, proposes a suitable MPLS VPN security solutions. The program to solve the VPN using MPLS backbone network in the public transport there is a second layer of information can not automatically encrypt, or connect easily made because of errors due to the interruption of information disclosure and other issues. To verify the proposed security program, the actual MPLS VPN can be simplified, abstracestablishing a simulation system MPLS VPN, and using OPNET simulation software simulation, simulation results of VPN officers practical reference value.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

361-365

Citation:

Online since:

November 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] FENG Jing . Technology of Multi-Protocol Label Switching[M].Beijing:People's Post and Telecommunication Press, 2002.

Google Scholar

[2] SHI Jing-lin, DING Wei.Broad Band network connection technology of MPLS[M]. Beijing:People's Post and Telecommunication Press, 2001.

Google Scholar

[3] LI Xiao-dong Technology and realization of MPLS[M]. Beijing:Electronic Industry Publishing Company, 2002.

Google Scholar

[4] Bruce Davie.Technology and application of Multi-Protocol Label Switching[M] . Beijing:Mechanism Press, 2001.

Google Scholar

[5] Ivan Pepelnjak, Jim Guichard. MPLS and VPN Architecture [M]. Beijing:People's Post and Telecommunication Press, 2002.

Google Scholar

[6] package Lihong, Li-Ya Li. Based on the SSL-VPN technology research. Network Security Technology and Application , 2004, 5: 42-44.

Google Scholar

[7] Wu Yan ed. VPN technology in the enterprise applications of thestrategy study . Fudan University Journal . 2008. 9. 20: 60-62.

Google Scholar

[8] Dai-kun compiled. VPN and Network Security . 2006-2: 22-26 Electronics Industry Publishing House.

Google Scholar

[9] Li Yang. K-means Clustering Algorithm in Intrusion Detection. Computer Engineering, 2007, 33 (14) : 154-156.

Google Scholar

[10] Q. X. Zhao and X. R. Meng . Design and Simulation of Security Solution for MPLS VPN. Air Force Engineering University, vol. D6, pp.63-66, (2005).

Google Scholar

[11] X. Yang and J. H. Sun, Integrating IPSec and MPLS to Enhance the Security of VPN, Network Security Technology and Application, PP. 36-39, Septemper, (2005).

Google Scholar