VPN在企业网中的规划与实现

更新时间:2023-10-02 21:22:01 阅读量: 综合文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

本 科 毕 业 论 题目: VPN在企业网中的规划与实现 学院: 班级: 姓名: 吉九学 指导教师: 职称: 完成日期: 2016 年 5 月 23 日

本科毕业论文

摘 要

当前互联网技术快速而高效的发展,通过电子商务进行办公成为各级单位和企业的办公方式,各个企业和政府都允许各自的分支机构访问自己的内部资源,以此来加强了解和方便办公。但是这一种信息交流使网络更加复杂,而且安全性也非常差,管理也不方便。目前比较主流且昂贵的组网方式有专线组网方式。它是通过同步数字体系将企业和政府单位连接到公用网络来实现点到点的通信。虽然这一种组网方式它的保密性比较强,独享带宽,传输快,不被其他信号干扰。但是花费太大,许多企业不能负担起这么高的费用,但是花费太大,许多企业不能负担起这么高的费用,

VPN技术是通过在互联网上建立自己的私有网络,换言之,就是在公网上虚拟出一条专网,这样既让服务质量得到保证,也提高了安全性和专用性,同时也节省了公司的开支。组建虚拟专用网是利用互联网的大量资源,为企业和政府的重要数据提供可用带宽传输数据。VPN的组网方式有两种可以分为点到点的虚拟网络和远程访问方式。当前比较主流的接入方式有IPSEC。

在本论文中,通过对VPN技术的基本了解和配置,比较了几种不同的虚拟专用网配置方式和优缺点。对加密认证,密钥管理,身份认证技术加以实现和验证。当前配置环境是在微软2003操作系统上配置服务器。通过在服务器添加用户名和密码,实现远程VPN访问。论文中也涉及了一部分电力系统中组建VPN的相关知识。

当然本论文只是对企业中的VPN进行了简单的规划与实现,这与实际中的企业VPN来说,是远远不够的。但是通过在模拟环境下配置VPN,对企业VPN组网有了深入的了解。这对于以后在实际情况中组建VPN网络起到了很大的作用。

关键词:企业;IPsec VPN;安全;数据加密

- I -

VPN在企业网中的规划与实现

Abstract

At present, and high speed and rapid development of Internet technology in China. Office become units at all levels and enterprises through the electronic commerce in the office. Branch companies and the government will allow their access to their internal resources. In order to strengthen the understanding and convenience of office.

But this kind of information exchange makes the network more complex, and the security is also very poor, the management is not convenient. At present, there are more mainstream and cheaper way of networking. It is the communication enterprises and government units connected to the public network to achieve point-to-point through synchronous digital system While this kind of network mode its confidentiality, exclusive bandwidth, transmission is fast, without the interference by other signals. But costs too much, many companies can't afford such a high cost.

VPN technology is through the Internet to build their own private network, in other words, It is a virtual private network bulided on the Internet, such already let the service quality guaranteed, also improves the security and specificity, but also save the company's expenses. Set up a virtual private network is to use a large number of data to use the Internet and video resources, for the enterprise and the government's important data provide the available bandwidth to transmit data. There are two main ways of VPN network can be divided into the point-to-point virtual network and remote access. Comparing the current mainstream way of accessing a IPSEC.

In this paper, through the basic understanding of VPN technology and configuration, compared with several different virtual private network configuration and advantages and disadvantages. Encryption and authentication, key management, identity authentication technology to achieve and verify. The current configuration environment is configured on the Microsoft 2003 operating system. By adding a user name and password on the server to achieve remote VPN access. Paper also covered part of the power system in the form of VPN. of course, this paper carried on the simple to the enterprise VPN planning and implementation, it has to do with the enterprise actual VPN, it is not enough. But through the VPN configuration in a simulated environment, to the enterprise VPN network have in-depth understanding. For the later set up VPN network in practice has played a big role.

Key Words: company;IPsec VPN; security; data encryption

- II -

本科毕业论文

目 录

摘 要 ..................................................................................................................................... I Abstract ................................................................................................................................... II 引 言 .................................................................................................................................... 1 第一章 综 述 ........................................................................................................................... 2

1.1 VPN技术概述 ............................................................................................................. 2

1.1.1 VPN的产生背景 .............................................................................................. 2 1.1.2 VPN的特点 ...................................................................................................... 2 1.2 VPN的分类 ................................................................................................................. 3

1.2.1 按VPN的业务类型划分 ................................................................................ 3 1.2.2 按所用设备类型划分 ...................................................................................... 3 1.2.3 按VPN的业务类型划分 ................................................................................ 3 1.3 VPN的相关技术及协议 ............................................................................................. 4

1.3.1 VPN关键技术 .................................................................................................. 4 1.3.2 VPN的基本协议 .............................................................................................. 5

第二章 VPN方案设计 ......................................................................................................... 11

2.1 IPsec VPN与SSL VPN的比较 ............................................................................... 11 2.2 IPsec VPN简述 ......................................................................................................... 11

2.2.1 IPsec VPN加密算法 ...................................................................................... 11 2.2.2 IPsec VPN安全服务 ...................................................................................... 13 2.3 IPsec VPN配置方式 ................................................................................................. 13

2.3.1 IPsec VPN端到端 .......................................................................................... 13 2.3.2 IPsec VPN远程访问 ...................................................................................... 14

第三章 VPN网络设计方案与实现 ....................................................................................... 15

3.1 项目背景 ................................................................................................................... 15 3.2 需求分析 ................................................................................................................... 15 3.3 解决方案 ................................................................................................................... 15 3.4 网络设计图 ............................................................................................................... 16 3.5 拓扑图设计 ............................................................................................................... 16

3.5.1 设备描述 ........................................................................................................ 17 3.5.2地址规划 ......................................................................................................... 17 3.5.3VLAN规划 ...................................................................................................... 18

- III -

本文来源:https://www.bwwdw.com/article/9bxd.html

Top