Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for realizing l2tp over IPsec access

A technology of IP address and access to users, which is applied in the field of communication and can solve problems such as indistinguishability

Active Publication Date: 2020-07-31
NANJING ZHONGXING SOFTWARE
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the LNS cannot distinguish between different user terminals under the same CPE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing l2tp over IPsec access
  • A method for realizing l2tp over IPsec access
  • A method for realizing l2tp over IPsec access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0054] Such as image 3 As shown, the embodiment of the present invention provides a method for realizing L2TP over IPsec access, which is applied to a Layer 2 Tunneling Protocol L2TP network server, and the method includes:

[0055] S10. When it is determined that there is a network address translation NAT device on the user side during the Internet key exchange IKE negotiation process with the L2TP over IPsec access user, convert the private network IP address of the user to the public network address converted by the NAT device. The IP address is used as the index of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for implementing L2TP over IPsec access, for use in an LNS, comprising: when determining the presence of a NAT device during the process of implementing IKE negotiation with an LT2P over IPsec user, setting a user private network IP address and a NAT translated public network IP address as security policy database indices; receiving an IPsec inbound encryption packet and performing decryption, and when determining that the packet is an L2TP packet and when same has passed through the NAT device, saving the user private network IP address; and before sending an L2TP packet to an L2TP over IPsec access user, if the user private network address is found, then using the user private network address and target IP address of the packet as indices to match the security policy database.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method for realizing L2TP over IPsec access and an L2TP network server (L2TP Network Server, LNS). Background technique [0002] IPsec (Internet Protocol Security) is a set of IP security protocols established by the IPsec group of the IETF (Internet Engineering Task Force, Internet Engineering Task Force). IPsec defines security services used at the network layer, and its functions include data encryption, access control to network elements, data source address verification, data integrity checks, and prevention of replay attacks. [0003] L2TP (Layer 2 Tunneling Protocol) is widely used as a method for mobile users to access the internal network of enterprises. However, L2TP itself does not provide encryption protection for data, and packets are easily stolen and tampered with during network transmission. Therefore, in practical applications, IPsec is usually...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/164H04L63/20
Inventor 臧亮唐骁琨
Owner NANJING ZHONGXING SOFTWARE