Collocation method of virtual private network based on internet security protocol and system therefor

A virtual private network and configuration method technology, applied in the field of virtual private network configuration, can solve the problems of cumbersome IPSecVPN parameter configuration and heavy workload, and achieve the effect of simple and convenient configuration

Active Publication Date: 2010-02-03
HILLSTONE NETWORKS CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an IPSec VPN configuration method and system, which can solve the technical problems of cumbersome IPSec VPN parameter configuration and heavy workload in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collocation method of virtual private network based on internet security protocol and system therefor
  • Collocation method of virtual private network based on internet security protocol and system therefor
  • Collocation method of virtual private network based on internet security protocol and system therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and the embodiments.

[0014] figure 1 It shows a flowchart of an IPSec VPN configuration method according to an embodiment of the present invention.

[0015] Reference figure 1 The IPSec VPN configuration method according to the embodiment of the present invention includes:

[0016] Step S102, in the VPN, configure the configuration parameters of each branch on the central server;

[0017] Step S104, the central server authenticates the branch that requests to access the VPN according to the configuration parameters;

[0018] Step S106, if the authentication is successful, the central server sends the configuration parameters to the corresponding branch; and

[0019] In step S108, the branch office uses the configuration parameter to perform configuration.

[0020] According to the IPSec VPN configuration method of this embodiment, after the branch sends a request to the cent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a collocation method of IPSec VPN and a system therefor; the method comprises: in the VPN, a central server is collocated configuration parameters of branch institutions; according to the configuration parameters, the central server can authenticate the branch institutions requiring to be accessed into the virtual private network; if the authentication is successful, the central server sends the configuration parameters into the corresponding branch institution; and the branch institution utilizes the configuration parameters for collocation. The method can realize the technical effect of simply and conveniently collocating the IPSec VPN.

Description

Technical field [0001] The invention relates to the field of network communication, and in particular to a method and system for configuring a virtual private network based on an Internet security protocol. Background technique [0002] A virtual private network (Virtual Private Network, VPN) can use the Internet or other public interconnection network infrastructure to create a virtual logical network for users, which has the same security, ease of management and stability as a private network. IPSec VPN based on IP security protocol to create virtual network is currently the most widely used VPN technology. [0003] The normal operation of IPSec VPN relies on multiple branches of the VPN to negotiate encryption algorithm, hash algorithm, authentication algorithm and other configuration parameters through Internet Key Exchange (IKE). After the negotiation is completed, the network administrator uses the negotiated The configuration parameters are configured accordingly for each b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/46H04L29/06H04L9/32
Inventor 刘向明陈建永
Owner HILLSTONE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products