中英对照 VPN技术

中英对照 VPN技术


2024年2月24日发(作者:)

VPN Technology

VPN Technology

Profile

VPN English name is a "virtual private network”, translated as" virtual private

network ". As the name suggests, VPN it might be construed as a virtual enterprise

inside the line. Virtual private networking (VPN) defined by a public network, secure

connection, the path through the confusion of public network security and stability

of the tunnel. Use this tunnel may be several times in the data encryption to use the

Internet. Virtual private network is an intranet expansion. Virtual private network

helps remote users, the company branch, business partners and suppliers with the

company's internal network to establish a credible security, data and guarantee the

safety of transmission. Virtual private network can be used for growing mobile users

worldwide internet access to implement security link can be used to reach the

company web site communication between the security of a virtual private sidings

way to the economy effectively Connect to the business partners and the users

security outside the on-line VPN.

Function

VPN can provide function: Firewall function, authentication, encryption, a

tunnel. VPN by special agreement on clear communications in the internet

connection is located in different parts of the two or more of an intranet to a

dedicated communications lines, it is like to put up a narrow line, but it doesn't need

to be made of real fiber optic cabling, circuit. This is a physical post office continue to

apply, but don't lay the line there is no need to buy a router and hardware device.

VPN technology is an important technology to the routers, switches, one of the

firewall or 2000, windows starts in the software is also supported the VPN, a word,

VPN the core is the use of public network set up a virtual private network.

Characteristics

1. Security

Although the security of the VPN technology and are many ways, but all of the

1

VPN Technology

VPN shall be guaranteed by the public network platforms transmission and security.

The security aspects, the VPN directly in the public internet, to build simple, easy and

flexible, but also its security issues have also underlined. The enterprise must ensure

that the VPN on the transfer of data are not against the door and poisoning, and to

prevent illegal network users to access resources, or proprietary information.

2. The quality of services to guarantee (QOS )

VPN net should help enterprises to provide different levels of data quality of

service, different users and service quality assurance to claim a big difference. In a

network, the establishment of the VPN another important demand is fully effective

use of limited resources for wan, important data provide a reliable bandwidth wan

traffic. The uncertainty of the bandwidth utilization is very low in the rush hour

traffic network congestion to a timely high demands on sending data without ;at

the traffic growth and caused a large number of network bandwidth. QOS in the flow

and flow control strategies, according to priority in the implementation of various

types of data bandwidth management, capable of being rational order and

prevention of obstruction.

3. Scalability, and flexibility

VPN must be able to support extranet through the intranet and of any type of

data, to add new nodes and support various types of a transmission medium, can

satisfy the transport voice and images and data and new applications for high quality

and transmission bandwidth requirements.

4. Manageability

Angle from users and operators perspective should be convenient to carry out

the management and maintenance. The goal of the VPN management network for :

Reduce risks and high extensibility, economy and high reliability. In fact, VPN

Administration mainly Include security, equipment management, administrative and

access control list control and management. QOS

The network protocols

The virtual private networking protocols have IP (for security is protection of IP)

2

VPN Technology

IP agreement secure communication, which IP agreement to encrypt and

certification of groups. IP as an agreement or a clan (series of interrelated )

agreement by the following parts : (1) Protection groups of the agreement ; (2)

Used to establish these security group the key exchange agreement. The former was

divided into two parts Encryption are the encapsulation of the security of the loading

and use less authentication head of the certification of groups and guarantee its

message integrity, but not provide confidentiality. Now, key agreement is the only

have the key exchange agreement, point to point tunneling protocol -- some tunnels

agreement on the internet to build IP VPN agreement, the main contents of the

tunnel is set up more agreement on the internet security virtual private networking

of communication means: layer forwarding, second tier: layer 2 protocol l2tp

forwarding tunneling protocol -- the second floor of the tunnel VPN agreement of the

tunnel agreement. Using encrypted data and control information :It uses encryption

and verification functions, means that it can use any support of reckoning. It provides

optional packets functions to improve the security, in addition, can improve the

hardware to speed up its performance.

Demand

VPN can help the user, the company branch, business partners and suppliers

with the company's internal network to establish a credible security and ensure the

safety of transmission of data. In data transferred to the low cost of the pressure of

the enterprise network, virtual private networking solutions will substantially reduce

the cost in the domain and remote network connection costs. At the same time, this

will simplify the network design and management, the connection of a new user and

web site. In addition, VPN can also protect the existing network investment. As a

business enterprise development, VPN solution enables users to their energies into

own business, rather than on the internet. Virtual private network can be used for

growing mobile users worldwide internet access to implement security link can be

used to reach the company web site communication between the safety of road, a

virtual private sidings, economy effectively used to connect to the business partners

3

VPN Technology

and the users security outside the on-line VPN.

At present many units are facing this challenge : Branch, distributors and

customers, partners and overseas Staff for the public network at any time after a visit

to the company's resources, these resources Include: the office of internal

documents, the project management system, etc. Now many firms use IP VPN to

ensure that the company headquarters or branches, as well as mobile staff security

link between.

Solution

For different user requirements, there are three VPN solutions : Remote

access virtual network access and business network intranet within the virtual and

enterprises expanded the virtual, the three types of the VPN, and traditional remote

access network, intranet and enterprise within the enterprise and relevant partners

of the enterprise network of outside the extranet.

For many user IP solutions to the high cost and complexity of the structure is a

headache. The existence of the following facts : To deploy and use client, it needs

assessment, planning, training, promotions and support, for users, these both

economically and technically is a great burden on the remote solutions and

expensive in integration and application of the interior for it professionals are severe

challenges Or more VPN IP by and large enterprises that IP is a VPN cost and

complexity, even a in the implementation of the scheme. To remain competitive, the

corporations internal information on the island, many companies and business

related to the different organizations and personal message, so many companies

need to find a kind of implementation, do not need to change the existing, operating

costs were low solutions.

--- -Conceptually, IP and VPN is operators (the service provider) support for

enterprise users of application. A common method can be applied by the operators

to support, which involve other operators network ( as operators of the

operators ).

---- IP VPN, the router is used to a user site users of internet access service provider

4

VPN Technology

on routers and routers. It is connected with the routers, the service provider to the

edge of the router. The site is such a network or network, they are part of users and

network through one or more of the link up to the VPN is a VPN. The group shared

the same route information, a site can be located in different a VPN.

---- In a service provider network to support more VPN, a site can belong to more

VPN. On certain policy, is more VPN site can in two VPN provided between the

forward, may also provide that capability. When a site at the same time of more VPN,

it must have a VPN in all the only address space. MPLS to implement - VPN IP

provides a flexible and scalability of the technical infrastructure and service providers

can use their internal networks, users to the specific needs to determine its own

network to support IP, VPN. Therefore, the MPLS network, a number of supports IP,

VPN, this one of the two methods.

VPN技术

一、简介

VPN的英文全称是“Virtual Private Network”,翻译过来就是“虚拟专用网络”。顾名思义,虚拟专用网络可以把它理解成是虚拟出来的企业内部专线。虚拟专用网(vpn)被定义为通过一个公用网络(通常是因特网)建立一个临时的、安全的连接,是一条穿过混乱的公用网络的安全、稳定的隧道。使用这条隧道可以对数据进行几倍加密达到安全使用互联网的目的。虚拟专用网是对企业内部网的扩展。虚拟专用网可以帮助远程用户、公司分支机构、商业伙伴及供应商同公司的内部网建立可信的安全连接,并保证数据的安全传输。虚拟专用网可用于不断增长的移动用户的全球因特网接入,以实现安全连接;可用于实现企业网站之间安全通信的虚拟专用线路,用5

VPN Technology

于经济有效地连接到商业伙伴和用户的安全外联网虚拟专用网。

二、功能

VPN可以提供的功能: 防火墙功能、认证、加密、隧道化。

VPN可以通过特殊的加密的通讯协议在连接在Internet上的位于不同地方的两个或多个企业内部网之间建立一条专有的通讯线路,就好比是架设了一条专线一样,但是它并不需要真正的去铺设光缆之类的物理线路。这就好比去电信局申请专线,但是不用给铺设线路的费用,也不用购买路由器等硬件设备。VPN技术原是路由器具有的重要技术之一,在交换机,防火墙设备或Windows 2000等软件里也都支持VPN功能,一句话,VPN的核心就是在利用公共网络建立虚拟私有网。

三、特点

1.安全保障

虽然实现VPN的技术和方式很多,但所有的VPN均应保证通过公用网络平台传输数据的专用性和安全性。在安全性方面,由于VPN直接构建在公用网上,实现简单、方便、灵活,但同时其安全问题也更为突出。企业必须确保其VPN上传送的数据不被攻击者窥视和篡改,并且要防止非法用户对网络资源或私有信息的访问。

2.服务质量保证(QoS)

VPN网应当为企业数据提供不同等级的服务质量保证。不同的用户和业务对服务质量保证的要求差别较大。在网络优化方面,构建VPN的另一重要需求是充分有效地利用有限的广域网资源,为重要数据提供可靠的带宽。广域网流量的不确定性使其带宽的利用率很低,在流量高峰时引起网络阻塞,使实时性要求高的数据得不到及时发送;而在流量低谷时又造成大量的网络带宽空闲。QoS通过流量预测与流量控制策略,可以按照优先级分实现带宽管理,使得各类数据能够被合理地先后发送,并预防阻塞的发生。

3.可扩充性和灵活性

VPN必须能够支持通过Intranet和Extranet的任何类型的数据流,方便增加新的节点,支持多种类型的传输媒介,可以满足同时传输语音、图像和数据等新应用对高质量传输以及带宽增加的需求。

4.可管理性

从用户角度和运营商角度应可方便地进行管理、维护。VPN管理的目标为:减小网络风险、具有高扩展性、经济性、高可靠性等优点。事实上,6

VPN Technology

VPN管理主要包括安全管理、设备管理、配置管理、访问控制列表管理、QoS管理等内容。

四、网络协议

常用的虚拟私人网络协议有:

IPSec : IPsec(缩写IP Security)是保护IP协议安全通信的标准,它主要对IP协议分组进行加密和认证。

IPsec作为一个协议族(即一系列相互关联的协议)由以下部分组成:(1)保护分组流的协议;(2)用来建立这些安全分组流的密钥交换协议。前者又分成两个部分:加密分组流的封装安全载荷(ESP)及较少使用的认证头(AH),认证头提供了对分组流的认证并保证其消息完整性,但不提供保密性。目前为止,IKE协议是唯一已经制定的密钥交换协议。

PPTP: Point to Point Tunneling Protocol -- 点到点隧道协议

在因特网上建立IP虚拟专用网(VPN)隧道的协议,主要内容是在因特网上建立多协议安全虚拟专用网的通信方式。

L2F: Layer 2 Forwarding -- 第二层转发协议

L2TP: Layer 2 Tunneling Protocol --第二层隧道协议

GRE:VPN的第三层隧道协议

OpenVPN:OpenVPN使用OpenSSL库加密数据与控制信息:它使用了OpenSSL的加密以及验证功能,意味着,它能够使用任何OpenSSL支持的算法。它提供了可选的数据包HMAC功能以提高连接的安全性。此外,OpenSSL的硬件加速也能提高它的性能。

五、需求

虚拟专用网可以帮助远程用户、公司分支机构、商业伙伴及供应商同公司的内部网建立可信的安全连接,并保证数据的安全传输。通过将数据流转移到低成本的压网络上,一个企业的虚拟专用网解决方案将大幅度地减少用户花费在城域网和远程网络连接上的费用。同时,这将简化网络的设计和管理,加速连接新的用户和网站。另外,虚拟专用网还可以保护现有的网络投资。随着用户的商业服务不断发展,企业的虚拟专用网解决方案可以使用户将精力集中到自己的生意上,而不是网络上。虚拟专用网可用于不断增长的移动用户的全球因特网接入,以实现安全连接;可用于实7

VPN Technology

现企业网站之间安全通信的虚拟专用线路,用于经济有效地连接到商业伙伴和用户的安全外联网虚拟专用网。

目前很多单位都面临着这样的挑战:分公司、经销商、合作伙伴、客户和外地出差人员要求随时经过公用网访问公司的资源,这些资源包括:公司的内部资料、办公OA、ERP系统、CRM系统、项目管理系统等。现在很多公司通过使用IPSec VPN来保证公司总部和分支机构以及移动工作人员之间安全连接。

六、解决方案

针对不同的用户要求,VPN有三种解决方案:远程访问虚拟网(Access

VPN)、企业内部虚拟网(Intranet VPN)和企业扩展虚拟网(Extranet VPN),这三种类型的VPN分别与传统的远程访问网络、企业内部的Intranet以及企业网和相关合作伙伴的企业网所构成的Extranet(外部扩展)相对应。

对于很多IPSec VPN用户来说,IPSec VPN的解决方案的高成本和复杂的结构是很头疼的。存在如下事实:在部署和使用软硬件客户端的时候,需要大量的评价、部署、培训、升级和支持,对于用户来说,这些无论是在经济上和技术上都是个很大的负担,将远程解决方案和昂贵的内部应用相集成,对任何IT专业人员来说都是严峻的挑战。由于受到以上IPSec VPN的限制,大量的企业都认为IPSec VPN是一个成本高、复杂程度高,甚至是一个无法实施的方案。为了保持竞争力,消除企业内部信息孤岛,很多公司需要在与企业相关的不同的组织和个人之间传递信息,所以很多公司需要找一种实施简便,不需改变现有网络结构,运营成本低的解决方案。

---- 从概念上讲,IP-VPN是运营商(即服务提供者)支持企业用户应用的方案。一个通用的方法可以适用于由一个运营商来支持的、涉及其他运营商网络的情况(如运营商的运营商)。

---- IP-VPN中,CE路由器是用于将一个用户站点接入服务提供者网络的用户边缘路由器。而PE路由器则是与用户CE路由器相连的、服务提供者的边缘路由器。站点是指这样一组网络或子网,它们是用户网络的一部分,并且通过一条或多条PE/CE链路接至VPN。VPN是指一组共享相同路由信息的站点,一个站点可以同时位于不同的几个VPN之中。

----在一个服务提供者网络支持多个VPN时,一个站点可以同时属于多个VPN。依据一定的策略,属于多个VPN的站点既可以在两个VPN之间提供一定的转发能力,也可以不提供这种能力。当一个站点同时属于多个VPN时,它必须具有一个在所有VPN中唯一的地址空间。MPLS为实现IP-VPN提供了一种灵活的、具有可扩展性的技术基础,服务提供者可以根据其内部网络以及用户的特定需求来决定自己的网络如何支持IP-VPN。所以,在MPLS/ATM网络中,有多种支持IP-VPN的方法,本文介绍其中两种方法。

8


发布者:admin,转转请注明出处:http://www.yc00.com/news/1708727242a1582452.html

相关推荐

发表回复

评论列表(0条)

  • 暂无评论

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信