L2TP over IPsec access realizing method
A technology of IP address and access user, applied in the field of communication, can solve the problem of indistinguishable
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.
[0054] Such as image 3 As shown, the embodiment of the present invention provides a method for realizing L2TPoverIPsec access, which is applied to a Layer 2 Tunneling Protocol L2TP network server, and the method includes:
[0055] S10, when it is determined that there is a network address translation NAT device on the user side during the Internet key exchange IKE negotiation process with the L2TPoverIPsec access user, the user's private network IP address and the public network IP address converted by the NAT device As an index of the IPsec security policy library;
[005...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


