Method for realizing secure communication of any two ends of the internet in DMVPN

A technology for secure communication at any two ends, applied in the direction of network interconnection, data exchange network, data exchange through path configuration, etc., can solve problems such as high rental fees, complex network configuration maintenance, etc., to simplify maintenance and improve throughput The effect of traffic flow and load reduction

Inactive Publication Date: 2009-09-02
SHANGHAI BAUD DATA COMM
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So as to replace the original costly Layer 2 access (such as ISDN, etc.), and solve the high rental fee or complicated network configuration and maintenance in the original application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure communication of any two ends of the internet in DMVPN
  • Method for realizing secure communication of any two ends of the internet in DMVPN
  • Method for realizing secure communication of any two ends of the internet in DMVPN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further elaborated below in conjunction with specific illustrations and examples.

[0036] Such as figure 2 As shown, this figure is one of the network topology structures described in the method of the present invention. The usual procedure in a practical setup is as follows:

[0037] A. Establish a suitable network topology. If there are spokes with relatively heavy loads, devices can be added to reduce the burden on the spokes.

[0038] B. Configure the hub node (see image 3 ). Configure a tunnel interface and use the mGRE mode on the interface. IPSEC-related configuration (profile name, transform-set used, etc.), and apply the profile name to the tunnel port for encryption protection of the tunnel. NHRP related configuration (configure multicast dynamic, mainly used to send multicast messages to all re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing secure communication of any two ends of the internet in DMVPN by applying a flow segmentation technique. The method utilizes the DMVPN to construct a topThe invention discloses a method for realizing secure communication of any two ends of the internet in DMVPN by applying a flow segmentation technique. The method utilizes the DMVPN to construct a topological network which adopts mGRE technology communication equipment at the center and parts and takes star-shaped structure as primary and network-shaped structure as supplement; the network ensuresological network which adopts mGRE technology communication equipment at the center and parts and takes star-shaped structure as primary and network-shaped structure as supplement; the network ensures the communication security by setting IPSEC; an NHRP protocol is utilized to lead the parts to communicate mutually and directly; and the NHRP protocol is extended and the extension header in the NHRthe communication security by setting IPSEC; an NHRP protocol is utilized to lead the parts to communicate mutually and directly; and the NHRP protocol is extended and the extension header in the NHRP protocol is used for completing flow segmentation. In the practical application, the invention can provide that enterprises can realize secure communication of all end points in the internet with loP protocol is used for completing flow segmentation. In the practical application, the invention can provide that enterprises can realize secure communication of all end points in the internet with low price, thus replacing the original two-layer access with expensive cost (such as ISDN and the like), and solving the high rentals or complex network configuration maintenance in the original applicaw price, thus replacing the original two-layer access with expensive cost (such as ISDN and the like), and solving the high rentals or complex network configuration maintenance in the original application.tion.

Description

Technical field: [0001] The invention relates to the technical fields of network security and data communication, in particular to a method for implementing secure communication at any two ends of the Internet by applying traffic segmentation technology in DMVPN (Dynamic Multipoint VPN, Dynamic Multipoint Virtual Private Network). Background technique: [0002] At present, for some companies whose headquarters, branches, and offices are scattered in various places, they need a secure network to interconnect them so that any two points can communicate. The initial solution is to rent some expensive two-layer access methods (such as ISDN, etc.). But in comparison, a cheaper and more flexible way of communication is to use Internet access and use IPSEC encryption to ensure security. [0003] IPSEC (Security Architecture for IP network) is a point-to-point encrypted tunnel. The network composed of arbitrary point-to-point encrypted tunnels between the headquarters and branches...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/46
Inventor 汪革方昊张晔
Owner SHANGHAI BAUD DATA COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products