freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

vpn的建立與技術分析畢業(yè)論文(參考版)

2025-07-30 06:18本頁面
  

【正文】 t always work well on smaller devices. ENTER THE SSL VPN The first SSL VPN vendor was Neoteris, purchased in 2022 by NetScreen, which Juniper bought the next year, according to Juniper’s Campagna. SSL Netscape Communications developed SSL and released therst public version in 1994. The IETF adopted the technology as a standard in 1999, naming it Transport Layer Security. However, most users still call it SSL. The technology, which offers the same encryption strengths as IPsec, has been used largely to secure financial transactions on the Web. In an SSL VPN, a user logs into a dedicated Web site. The browser in。s identity and designated workaccess level, and if everything 山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )52checks out, admits and decrypts the information. Both the transmitter and receiver must support IPsec and share a public encryption key for authentication. December 2022 17 Firewall Terminal services Decrypted traffic File and media server Inter SSL encrypted Remote user: traffic Business partner Kiosk user Temporary staff Traveling staff TelemuterDesktop SSL VPN: Authentication Authorization Decryption Integrity checkWeb proxy Web server Email server Figure 1. In an SSL VPN, a remote user logs in to a dedicated Web site to access a pany’s work. The user’s browser initiates the session with a corporate server or desktop puter, which downloads the necessary software to the client. The software uses SSL for encrypting the transmitted data. At the corporate site, the VPN system authenticates users, determines what level of work access they should have, and if everything checks out, decrypts the data and sends it to the desired SSL, IPsec is implemented as a full application installed on the client. And it doesn’t take advantage of existing browser code.IPsec limitationsAccording to Forrester’s Silva, corporate IT departments increasingly need to let remote users connect to enterprise works, which is challenging with IPsec. The normal practice of conguring IPsec VPNs to allow full access to a work can create vulnerabilities. To avoid this, administrators would have to configure them to permit access only to parts of a work, according to Peter Silva, technical marketing manager for F5 Networks SSL VPNs. IPsec VPNs also have trouble letting certain traffic transverse firewalls, he explained. This isn’t usually a problem, as most panies have the same basic ports open both inbound and outbound. However, it is possible that one 山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )53pany would let trafc out over a port that another doesn39。t encrypt data. IPsec and SSL VPNs, on the other hand, use encrypted packets with cryptographic keys exchanged between sender and receiver over the public Inter. Once encrypted, the data can take any route over the Inter to reach it39。 said Rich Campagna, Juniper161。 Organizations are thus increasingly adopting VPNs based on Secure Sockets Layer technology from vendors such as Aventail, Cisco Systems, F5 Networks, Juniper Networks, and Nortel Networks. SSL VPNs enable relatively easy deployment, added Chris Silva, an analyst at Forrester Research, a marketresearchrm. A pany can install the VPN at its head quarters and push any necessary software to users, who then access the work via their browsers, he explained. Organizations thus do not have to 山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )51manage, update, or buy licenses for multiple clients, yielding lower costs, less maintenance and support, and greater simplicity than IPsec VPNs,Silva said. From a remoteaccess perspective, IPsec is turning into a legacy technology,161。 work, explained Graham Titterington, principal analyst with marketresearch firm Ovum, IPsec [generally] connects users into a work and gives the same sort of access they would have if they were physically on the LAN.161。山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )49參考文獻[1]高海英,薛元星,辛陽 .VPN 技術 ..[2]Steven Brown 著. 董小宇,魏鴻,[3]戴宗坤, .[4]邱亮, .[5].[6]( VPN).[7]Carlton R. Davis ,:VPN [8].[9]李文俊等. .2022.[10]李莉,童小林譯 ..2022.[11] 高海英, VPN 技術,[M],機械工業(yè)出版社,2022[12]Yusuf Bhaiji,Network Security Technologies and Solutions,[M] ,Cisco Press ,2022山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )50附錄 1 英文原文A New Virtual Prevate Network for Today39。 最后,非常感謝網(wǎng)絡工程專業(yè)的所有老師四年來對我的辛勤培育和熱心關懷。其次,感謝我同組倆位同學***和***同學,在我學習 VPN 的基礎知識和做實驗過程中,給予我的幫助。我在做畢業(yè)設計的學習和設計過程中遇到了不少困難,老師總能給予我指導和建議。我將銘記曾經(jīng)直接或間接為本論文做出貢獻和給予我指導和支持的老師們。山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )44圖 510 R1 上對隧道 1 各協(xié)議的配置山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )45圖 511 R4 上對隧道 1 各協(xié)議的配置  . 測試站點之間的連通性 下面是 ping 之前和 ping 之后加密的數(shù)據(jù)山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )46圖 512 連通性測試  . 配置 NAT 實現(xiàn)網(wǎng)絡地址轉換   1) 在 R1 和 R4 上配置 NAT(PAT ),將私網(wǎng)地址全部轉換成路由出口公網(wǎng)的 IP 地址圖 513 R1 上的 NAT 轉換山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )47圖 514 R4 上的 NAT 轉換  2) 然后在 PC1 上分別 ping 私網(wǎng)的 IP 地址和公網(wǎng)的 IP 地址,可以發(fā)現(xiàn) ping 公網(wǎng)的 IP 地址都進行了 NAT 地址轉換,而 ping 私網(wǎng)的IP 地址都經(jīng)過了隧道加密。注意:只宣告內(nèi)網(wǎng)網(wǎng)段和 tunnel 隧道的網(wǎng)段。本實驗設計的拓撲圖如下圖 51 所示:山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )39圖 51 IPSec over GRE 實驗拓撲圖 IPSec over GRE 的步驟及配置. 配置網(wǎng)絡互聯(lián)的基本參數(shù)   1) 配置 R2 和 R3 網(wǎng)絡之間的基本參數(shù),并啟用 OSPF 路由協(xié)議  注意:在 R2 和 R3 上各配置了一條默認路由指向兩邊的末梢網(wǎng)絡,這樣公網(wǎng)就可以訪問內(nèi)網(wǎng)的數(shù)據(jù)了。GRE 是通用路由封裝協(xié)議,可以實現(xiàn)任意一種網(wǎng)絡層協(xié)議在另一種網(wǎng)絡層協(xié)議上的封裝。這就需要將 IPSec 運行在GRE(tunnel )隧道之上,真實物理接口運行 NAT 進行網(wǎng)絡地址轉換,這就避免了 IPSec VPN 和 NAT 之間的沖突。這時我們可以結合使用 GRE 與 IPSec,利用 GRE 對用戶數(shù)據(jù)和路由協(xié)議報文進行隧道封裝,然后使用 IPSec 來保護 GRE 隧道的安全,即 GRE over IPSec VPN。IPSec 使用了多種加密算法、散列算法、密鑰交換方法等為 IP 數(shù)據(jù)流提供安全性,它可以提供數(shù)據(jù)的機密性、數(shù)據(jù)的完整性、數(shù)據(jù)源認證和反重放等安全服務。 IPSec(IP security,IP 安全性)的主要作用是為 IP 數(shù)據(jù)通信提供安全服務。GRE 通常用來構建站點到站點的 VPN 山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )38隧道,它最大的優(yōu)點是可以對多種協(xié)議、多種類型的報文進行封裝,并在隧道中傳輸。無法保證數(shù)據(jù)的完整性和保密性。GRE 協(xié)議的缺點: 由于 GRE 是將一個數(shù)據(jù)包封裝到另一個數(shù)據(jù)包中,因此可能會遇到 GRE 的數(shù)據(jù)報大于網(wǎng)絡接口所設定的數(shù)據(jù)包最大尺寸的情況。 ②支持多種協(xié)議無法進行路由,比如 NetBIOS 或在 IP 網(wǎng)絡上進行非 IP 傳輸。多播傳輸?shù)睦影?OSPF, EIGRP, 以及 RIPV2。 GRE 協(xié)議的優(yōu)缺點GRE 協(xié)議的優(yōu)點:①支持加密的多播傳輸。山 東 科 技 大 學 畢 業(yè) 設 計 (論 文 )37IPsec 定義了開放的體系結構和框架。則按可以減少握手的時間,一次握手就可以傳送大量的數(shù)據(jù),尤其適用于傳輸數(shù)據(jù)
點擊復制文檔內(nèi)容
環(huán)評公示相關推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1