Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for simulating L2TP dialing

A technology of virtual private dial-up and router, which is applied in the direction of data exchange through path configuration, digital transmission system, electrical components, etc. It can solve problems such as difficulties, no composite application, and inability to meet the situation when a large number of users access at the same time, to achieve The effect of solving technical problems

Active Publication Date: 2008-07-23
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing test instruments on the market have limited functions. They can either simulate the user access of IPSec VPN or the model of L2TP multi-user access, but there is no test software that can simulate the combination of L2TP based on IPSec. application scenarios, which brings the following difficulties to the test work: For the combined test of L2TP remote access and IPSecVPN services, several PCs can be used to simulate a small number of user access scenarios, but it cannot satisfy a large number of simultaneous access. In the current situation, it is impossible to accurately test the limit indicators of IPSec-based L2TP services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for simulating L2TP dialing
  • Method for simulating L2TP dialing
  • Method for simulating L2TP dialing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, the method for simulating L2TP dialing in the present invention will be described in detail with reference to accompanying drawings 1-5.

[0029] The core idea of ​​the present invention is: use test meter to simulate L2TP user access, add high-performance router in front of test meter to do the encryption processing of IPSec tunnel mode to the message of L2TP type that test meter sends, the message through processing like this, for For the router to be tested, it is equivalent to that the PC user directly initiates access through the IPSec-based L2TP policy, which is almost the same as the actual application scenario.

[0030] Since the test instrument can simulate the access of a large number of L2TP users, and the IPSec encryption processing performance of the auxiliary test router is better than that of the device under test, so as to achieve the purpose of testing the IPSec-based L2TP service limit index of the router. As shown in FIG. 4 , it is a sche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for simulating a layer 2 tunneling protocol L2TP to dial, the method comprises utilizing a test instrumentation to simulate a L2TP user to switch in, having a conversion with IPSec which is established by tested equipment after doing densification treatment with IP security IPSec tunneling mode for the message such as L2TP which is sent out by the test instrumentation through an auxiliary router, and finishing remote dial of L2TP. The method of simulating L2TP to dial of the invention can simulate a large amount of users and can simultaneously switch in VPN on the base of L2TP form of IPSec.

Description

technical field [0001] The invention relates to network communication security technology IPSec, in particular to a method for simulating Layer Two Tunneling Protocol (Layer Two Tunneling Protocol, L2TP) dial-up based on IPSec virtual private network (Virtual Private Network, VPN). Background technique [0002] With the rapid development of the Internet, the IP network has gradually become an indispensable tool in people's daily work and life, and the demand for security assurance of data transmission on the IP network is becoming increasingly strong. As we all know, IP network is an open network, and there is no security at all to use IP network for data communication without taking any measures. In order to meet the needs of obtaining secure communication on the IP network, the IP Security (IPSec) working group of the Internet Engineering Task Force has formulated a set of open network security protocols based on cryptography, collectively called the IPSec architecture. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/46
Inventor 陈曦
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products