Configuration method and system of virtual private network based on Internet security protocol

A virtual private network and configuration method technology, applied in the field of virtual private network configuration, can solve the problems of cumbersome IPSecVPN parameter configuration and heavy workload, and achieve the effect of simple and convenient configuration

Active Publication Date: 2012-02-22
HILLSTONE NETWORKS CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an IPSec VPN configuration method and system, which can solve the technical problems of cumbersome IPSec VPN parameter configuration and heavy workload in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration method and system of virtual private network based on Internet security protocol
  • Configuration method and system of virtual private network based on Internet security protocol
  • Configuration method and system of virtual private network based on Internet security protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0014] figure 1 A flow chart of a method for configuring an IPSec VPN according to an embodiment of the present invention is shown.

[0015] refer to figure 1 , according to the configuration method of the IPSec VPN of the embodiment of the present invention comprises:

[0016] Step S102, in the VPN, configure the configuration parameters of each branch office on the central server;

[0017] Step S104, the central server authenticates the branch requesting to access the VPN according to the configuration parameters;

[0018] Step S106, if the authentication is successful, the central server sends the configuration parameters to the corresponding branches; and

[0019] Step S108, the branch uses the configuration parameters to configure.

[0020] According to the IPSec VPN configuration method of this embodiment, after the branch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and system for configuring IPSec VPN, the method comprising: in the VPN, configuring the configuration parameters of each branch on the central server; authentication; if the authentication is successful, the central server sends the configuration parameters to the corresponding branches; and the branches use the configuration parameters for configuration. The invention realizes the technical effect that the IPSec VPN can be configured simply and conveniently.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and system for configuring a virtual private network based on an Internet security protocol. Background technique [0002] A virtual private network (Virtual Private Network, VPN) can use the Internet (Internet) or other public Internet infrastructure to create a virtual logical network for users, with the same security, ease of management and stability as a private network. IPSec VPN, which creates a virtual network based on IP security protocols, is currently the most widely used VPN technology. [0003] The normal work of IPSec VPN depends on the multiple branches of the VPN to negotiate multiple configuration parameters such as encryption algorithm, hash algorithm, and authentication algorithm through Internet Key Exchange (IKE). After the negotiation is completed, the network administrator uses the negotiated The configuration parameters are configured for each...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/24H04L12/46
Inventor 刘向明陈建永
Owner HILLSTONE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products