Research of an IPSec VPN Application in Enterprise Network

Article Preview

Abstract:

A design scheme based on IPSec VPN Service in VMware simulation platform was proposed. At first, this paper introduces the virtual machine and the working principle of IPSec VPN. Using VMware to construct a network simulation platform. Next,Through Routing and Remote Access Service、VPN Service of Windows Server 2008′s, the route between subnets was implemented. At last, the simulation experimental results show that the design of stable operation, high safety, no need of special routing equipment, and has low cost, easy to implement, is a safe, cheap, high performance design solutions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1614-1617

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liu Hao, Yang Shu-tang, He De-quan, Xia Wei-wei, Design and implementation of an IPSec VPN education experiment system, Computer Applications and Software, Vol. 23, No. 7, (2006) 3-4.

Google Scholar

[2] Jin Hai, Hu Yong-liang, VPN Expermient Environment Construction Based on Windows Server 2003, Journal of Taizhou University, Vol. 27, No. 6, (2005) 17-20.

Google Scholar

[3] Chen Jian-rui, He Zeng-ying, Building of the VPN Experimental Environment Based on Virtual Machine, Research and exploration in laboratory, Vol. 29, No. 1, (2010) 59-61.

Google Scholar

[4] Jiang Dong-yi, Lv Shu-wang, Luo Xiao-guang, Analysis on the key techniques in VPN, Computer engineering and applications, No. 15 (2003) 173-177.

Google Scholar

[5] Ping Han, Yu Jing, Windows Server 2003 configuration management project training tutorial, China WaterPower Press, (2009) 224-226.

Google Scholar

[6] Liu Tao, Design and Implementation of DHCP Relay Agent in Network Simulation Platform, Science Technology and Engineering, Vol. 12, No. 24, (2012) 279-282.

Google Scholar

[7] Zhang Yan-li, The research of VPN technology based on CAN, Ho Hai University, (2003) 36-43.

Google Scholar

[8] Chen Yong, The comparison of the mainstream VPN technology and applications analysis, China CIO News, No. 7, (2010) 74-75.

Google Scholar