Unlock instant, AI-driven research and patent intelligence for your innovation.

L2TP over IPsec access realizing method

A technology of IP address and access user, applied in the field of communication, can solve the problem of indistinguishable

Active Publication Date: 2016-04-20
NANJING ZHONGXING SOFTWARE
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the LNS cannot distinguish between different user terminals under the same CPE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • L2TP over IPsec access realizing method
  • L2TP over IPsec access realizing method
  • L2TP over IPsec access realizing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0054] Such as image 3 As shown, the embodiment of the present invention provides a method for realizing L2TPoverIPsec access, which is applied to a Layer 2 Tunneling Protocol L2TP network server, and the method includes:

[0055] S10, when it is determined that there is a network address translation NAT device on the user side during the Internet key exchange IKE negotiation process with the L2TPoverIPsec access user, the user's private network IP address and the public network IP address converted by the NAT device As an index of the IPsec security policy library;

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an L2TP over IPsec access realizing method which is applied to LNS. The method comprises that when existence of an NAT device is determined in the IKE negotiation process with an L2TP over IPsec user, the private network IP address of the user and the public network IP address after NAT conversion serve as index of a safety strategy library; an input IPsec encryption message is received and decrypted, when the message is determined to be an L2TP message and passes the NAT device, the private network IP address of the user is stored; and if the private network IP address of the user is found before the L2TP message is sent to an L2TP over IPsec access user, the private network IP address of the user and a target IP address of the message serve as the index to match the safety strategy library. According to the invention, the LNS can distinguish different L2TP over IPsec access users in the network in which NAT exists.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method for realizing L2TPoverIPsec access and an L2TP network server (L2TPNetworkServer, LNS). Background technique [0002] IPsec (Internet Protocol Security) is a set of IP security protocols established by the IPsec group of IETF (InternetEngineeringTaskForce, Internet Engineering Task Force). IPsec defines security services used at the network layer, and its functions include data encryption, access control to network elements, data source address verification, data integrity checks, and prevention of replay attacks. [0003] L2TP (Layer 2 Tunneling Protocol) is widely used as a method for mobile users to access the internal network of enterprises. However, L2TP itself does not provide encryption protection for data, and packets are easily stolen and tampered with during network transmission. Therefore, in practical applications, IPsec is usually used to pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/164H04L63/20
Inventor 臧亮唐骁琨
Owner NANJING ZHONGXING SOFTWARE