Title :
Implementation of Virtual Private Network Based on IPSec Protocol
Author_Institution :
Sch. of Politics & Law & Public Adm., Hubei Univ., Wuhan, China
Abstract :
This paper describes the four tunneling protocols which are commonly used in realizing the VPN (virtual private network), and analyses the characteristics and the appropriate case of each protocol. Basing on these description and analysis, the implementation of IPSec protocol by configuring the Windows 2003 Operating System and the implementation of IPSec protocol by using the Cisco equipments are introduced.
Keywords :
IP networks; cryptographic protocols; virtual private networks; Cisco equipments; IPSec protocol; Windows 2003 operating system; tunneling protocol; virtual private network; Access protocols; Computer networks; Cryptography; Data encapsulation; Local area networks; Network servers; Operating systems; Packaging machines; Tunneling; Virtual private networks; Authentication; IPSec; Tunneling Protocol; VPN;
Conference_Titel :
Future Computer and Communication, 2009. FCC '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-0-7695-3676-7
DOI :
10.1109/FCC.2009.16