The Solution and Management of VPN Based IPSec Technology

Article Preview

Abstract:

The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

210-219

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Aboba, B., & Dixon, W. (2004). IPsec-network address translation (NAT) compatibility requirements, RFC3715.

DOI: 10.17487/rfc3715

Google Scholar

[2] Doraswamy, N., & Harkins D. (2003). IPsec: the new security standard for the internet, intranets, and virtual private networks. London: Prentice-Hall.

Google Scholar

[3] Sebastian Marius Rosu, Marius Marian Popescu the virtual enterprise network based on IPSec VPN Solutions and Management. (LJACSA) International Journal of Advanced Computer Science and Applications. Vol 3, No. 11, (2012).

DOI: 10.14569/ijacsa.2012.031105

Google Scholar

[4] W. Stallings, Cryptography and network security: Principles and Practics. Prentice Hall, (1998).

Google Scholar

[5] T. Huang, G.Q. Wu and J. Wei, Runtime monitoring composite Web services through state full aspect extension, Journal of Computer Science and Technology, vol. 24(2), pp.294-308, (2009).

DOI: 10.1007/s11390-009-9225-4

Google Scholar

[6] Dierks, T., & Rescorla, E. (2008). The transport layer security(TLS) protocol, RFC 5246.

DOI: 10.17487/rfc5246

Google Scholar

[7] Doraswamy, N., & Harkins, D. (2003). IPSec: The new security standard for the internet, intranets, and virtual private networks. London: Prentice-Hall.

Google Scholar

[8] Errata K.S. (2005). IP encapsulating security payload, RFC 4303.

Google Scholar

[9] Feilner, M. (2006). OpenVPN: Building and integrating virtual private networks. Packt: Birmingham.

Google Scholar

[11] Hamzel, K., Pall, G., Verthein, W., Taarud, J., Little, & Zorn, G, (1999). Point-to-Point tunneling protocol(PPTP), RFC 2637.

DOI: 10.17487/rfc2637

Google Scholar

[12] Jim, B., & Srinivasan, S. (2003). Simple mobility support for IPsec tunnel mode. Vehicular Technology Conference, 3.

DOI: 10.1109/vetecf.2003.1285375

Google Scholar

[13] Kent, S. (2005). IP authentication header, RFC 4302.

Google Scholar

[14] Loshin, P. (2003). IPv6: theory, protocol, and practice(and ed. ). United States of America: Elsevier.

Google Scholar

[15] Maughan, D., Schertler, M., Schneider, M., & Turner, J. (1998). Internet security association and key management protocol(ISAKMP), RFC 2408.

DOI: 10.17487/rfc2408

Google Scholar

[16] Perkins, C. (1996). Minimal encapsulation within IP, RFC (2004).

Google Scholar

[17] Thayer, R., Doraswamy, N., & Glenn, R. (1998). IP security document roadmap, RFC (1994).

DOI: 10.17487/rfc2411

Google Scholar