虚拟专用网毕业论文外文翻译.doc - 深圳网站优化推广公司

虚拟专用网毕业论文外文翻译.doc 10页

  • 内容提供方:ligennv1314
  • 大小49.5 KB
  • 字数约1.29万字
  • 发布时间2019-08-06发布于江西
  • 浏览人气1
  • 下载次数仅上传者可见
  • 收藏次数0
  • 需要金币*** 金币 (10金币=人民币1元)

虚拟专用网毕业论文外文翻译.doc

  • 关闭预览
虚拟专用网毕业论文外文翻译.doc

想预览更多内容,点击免费在线预览全文

免费在线预览全文
[在此处键入] 附录:英文技术资料翻译 英文原文: Solutions, such as the various encryption methods and PKI, enable businesses to securely extend their networks through the Internet. One way in which businesses accomplish this extension is through Virtual Private Networks (VPNs). A VPN is a private network that is created via tunneling over a public network, usually the Internet. Instead of using a dedicated physical connection, a VPN uses virtual connections routed through the Internet from the organization to the remote site. The first VPNs were strictly IP tunnels that did not include authentication or encryption of the data. For example, Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that can encapsulate a wide variety of Network Layer protocol packet types inside IP tunnels. This creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Other examples of VPNs that do not automatically include security measures are Frame Relay, ATM PVCs, and MultIProtocol Label Switching (MPLS) networks. A VPN is a communications environment in which access is strictly controlled to permit peer connections within a defined community of interest. Confidentiality is achieved by encrypting the traffic within the VPN. Today, a secure implementation of VPN with encryption is what is generally equated with the concept of virtual private networking. VPNs have many benefits: Cost savings - VPNs enable organizations to use cost-effective, third-party Internet transport to connect remote offices and remote users to the main corporate site. VPNs eliminate expensive dedicated WAN links and modem banks. Additionally, with the advent of cost-effective, high-bandwidth technologies, such as DSL, organizations can use VPNs to reduce their connectivity costs while simultaneously increasing remote connection bandwidth. Security - VPNs provide the highest level of security by using advanced encryption and authentication protocols that protect data from unauthorized access. Scalability - VPNs enable corporations to use the Internet infrastructure that is within Internet service providers (ISPs) and devices. This makes it easy to add new users, so that corporations can add significant capacity without adding significant infrastructure. Compatibility with broadband technology - VPNs allow mobile workers, telecommuters, and people who want to extend their workday to take advantage of high-speed, broadband connectivity to gain access to their corporate networks, providing workers significant flexibility and efficiency. High-speed broadband connections provide a cost-effective solution for connecting remote offices. In the simplest sense, a VPN connects two endpoints over a public network to form a logical connection. The logical connections can be made at either Layer 2 or Layer 3 of the OSI model. VPN technologies can be classified broadly on these logical connection models as Layer 2 VPNs or Layer 3 VPNs. Establishing connectivity between sites over a Layer 2 or Layer 3 VPN is the same. A delivery header is added in front of the payload to get it to the destination site. This chapter focuses on Layer 3 VPN technology. Common examples of Layer 3 VPNs are GRE, MPLS, and IPSec. Layer 3 VPNs can be point-to-point site connections such as GRE and IPSec, or they can establish any-to-any connectivity to many sites using MPLS. Generic routing encapsulation (GRE) was originally developed by Cisco and later standardized as RFC 1701. An IP delivery header for GRE is defined in RFC 1702. A GRE tunnel between two sites that have IP reachability can be described as a VPN, because the private data between the sites is encapsulated in a GRE delivery header. Pioneered by Cisco, MPLS was originally known as tag switching and later standardized via the IETF as MPLS. Service providers are increasingly deploying MPLS to offer MPLS VPN services to customers. MPLS VPNs use labels to encapsulate the original data, or payload, to form a VPN. How does a network administrator prevent eavesdropping of data in a VPN? Encrypting the data is one way to protect it. Data encryption is achieved by deploying encryption devices at each site. IPSec is a suite of protocols developed with the backing of the IETF to achieve secure services over IP packet-switched networks. The Internet is the most ubiquitous packet-switched public network; therefore, an IPSec VPN deployed over the public Internet can provide significant cost savings to a corporation as compared to a leased-line VPN. IPSec services allow for authentication, integrity, access control, and confidentiality. With IPSec, the information exchanged between remote sites can be encrypted and verified. Both remote-access and site-to-site VPNs can be deployed using IPSec. There are two basic types of VPN networks: Site-to-site Remote-access A site-to-site VPN is created when connection devices on both sides of the VPN connection are aware of the VPN configuration in advance. The VPN remains static, and internal hosts have no knowledge that a VPN exists. Frame Relay, ATM, GRE, and MPLS VPNs are examples of site-to-site VPNs. A remote-access VPN is created when VPN information is not statically set up, but instead allows for dynamically changing information and can be enabled and disabled. Consider a telecommuter who needs VPN access to corporate data over the Internet. The telecommuter does not necessarily have the VPN connection set up at all times. The telecommuters PC is responsible for establishing the VPN. The information required to establish the VPN connection, such as the IP address of the telecommuter, changes dynamically depending on the location of the telecommuter. A site-to-site VPN is an extension of a classic WAN network. Site-to-site VPNs connect entire networks to each other, for example, they can connect a branch office network to a company headquarters network. In the past, a leased line or Frame Relay connection was required to connect sites, but because most corporations now have Internet access, these connections can be replaced with site-to-site VPNs. Site-to-site VPN In a site-to-site VPN, hosts send and receive normal TCP/IP traffic through a VPN gateway, which can be a router, firewall, Cisco VPN Concentrator, or Cisco ASA 5500 Series Adaptive Security Appliance. The VPN gateway is responsible for encapsulating and encrypting outbound traffic from a particular site and sending it through a VPN tunnel over the Internet to a peer VPN gateway at the target site. Upon receIPt, the peer VPN gateway strIPs the headers, decrypts the content, and relays the packet toward the target host inside its private network. Remote-Access VPN Remote-access VPNs are an evolution of circuit-switching networks, such as plain old telephone service (POTS) or ISDN. Remote-access VPNs can support the needs of telecommuters, mobile users, and extranet consumer-to-business traffic. Remote-access VPNs support a client / server architecture where a VPN client (remote host) requires secure access to the enterprise network via a VPN server device at the network edge. In the past, corporations supported remote users by using dial-in networks and ISDN. With the advent of VPNs, a mobile user simply needs access to the Internet to communicate with the central office. In the case of telecommuters, their Internet connectivity is typically a broadband connection. In a remote-access VPN, each host typically has Cisco VPN client software. Whenever the host tries to send traffic intended for the VPN, the Cisco VPN Client software encapsulates and encrypts that traffic before sending it over the Internet to the VPN gateway at the edge of the target network. Upon receIPt, the VPN gateway behaves as it does for site-to-site VPNs. An emerging remote-access technology is Cisco IOS SSL VPN. This technology provides remote-access connectivity from almost any Internet-enabled host using a web browser and its native Secure Sockets Layer (SSL) encryption. SSL VPNs allow users to access web pages and services, including the ability to access files, send and receive email, and run TCP-based applications without IPSec VPN Client software. They provide the flexibility to support secure access for all users, regardless of the host from which they establish a connection. This flexibility enables companies to extend their secure enterprise networks to any authorized user by providing remote-access connectivity to corporate resources from any Internet-enabled host. SSL VPN currently delivers two modes of access: clientless and thin client. With clientless SSL VPN, a remote client needs only an SSL-enabled web browser to access HTTP- or HTTPS-enabled web servers on the corporate LAN. In a thin client SSL VPN environment, a remote client must download a small, Java-based applet for secure access of TCP applications that use static port numbers. UDP is not supported in a thin client environment. SSL VPNs are appropriate for user populations that require per-application or per-server access control, or access from non-enterprise-owned desktops. SSL VPNs are not a complete replacement for IPSec VPNs. IPSec VPNs allow secure access to all of an organizations client/server applications. Additionally, SSL VPNs do not support the same level of cryptographic security that IPSec VPNs support. While SSL VPNs cannot replace IPSec VPNs, in many cases, they are complementary because they solve different problems. This complementary approach allows a single device to address all remote-access user requirements. The primary benefit of SSL VPNs is that they are compatible with Dynamic MultIPoint VPNs (DMVPNs), Cisco IOS Firewalls, IPSec, intrusion prevention systems (IPSs), Cisco Easy VPN, and Network Address Translation (NAT). 中文译文: 解决方案,如各种加密方法和PKI,使企业能够安全地通过互联网扩展其网络,实现这一企业网络扩展的方式之一就是通过虚拟专用网。 VPN通常是通过公共网络建立隧道的专用网络,VPN不是使用专用的物理连接,而是使用一个虚拟链路通过互联网实现远程站点到本地网络的连接,起初VPN的IP隧道中并不包含对身份验证和加密数据的服务,例如,思科公司开发的通用路由封装隧道协议,可以封装一个网络层协议在IP隧道内的各种数据包类型。远程站点可以通过创建一个虚拟的点对点链路进入到内部网络。另外一些例子,比如一些不会自动采取安全措施的协议,帧中继,ATM虚拟链路和多协议标签交换网络。 VPN是一种严格访问控制权限的通信环境,加密数据在虚拟专用网内进行传输。今天,执行安全VPN加密通常就是等同于与虚拟专用网的概念。 虚拟专用网有许多好处: 节约成本:虚拟专用网使企业能够降通过第三方互联网传输进行远程办公用户和企业总部之间连接的成本,虚拟专用网消除了昂贵的专用广域网连接和调制解调器器件,此外,随着成本的出现效益,高带宽的技术,如DSL,企业可以使用VPN连接,以减少成本,同时提高远程连接带宽, 安全性 - VPN提供采用先进的加密和认证协议,以最高级别的安全机制保护数据免受未授权的访问。 可扩展性 - 虚拟专用网络使企业能够利用互联网基础设施,与Internet服务提供商的设备建立通信,这十分方便的添加新用户,使公司与其他公司建立通信在不增加基础设施的前提下。 兼容宽带技术 VPN允许移动员工,移动办公,员工可以在工作日以外时间通过VPN以高速的宽带连接来访问企业网络,这为工作人员提供了极好的灵活性和提高了工作效率,高速宽带连接提供了具有成本效益的远程办公室连接的解决方案 简单的来讲,VPN通过公共网络实现两个端点的逻辑连接。逻辑连接可以建立在OSI模型的第2层和第3层。VPN技术大致可以分为第2层VPN或第3层逻辑VPN两种连接模型, 第2层或第3层VPN建立的是相同站点之间的连接,在数据包的头部增加了一个标识字段来使数据到达目的站点,本章的重点是第三层VPN技术。 常见的VPN例子有GRE,MPLS,和IPSec。第3层VPN可以实现站点到站点直接的连接,如GRE和IPSec,或者通过MPLS建立多对多的站点连接。 通用路由封装(GRE)最初是由思科创建的,后来作为RFC 1701规范。在RFC 1702中定义了GRE的一种IP头,两个站点之间的GRE隧道是提供IP可达作为VPN的描述,因为站点之间的私人数据被封装在一个GRE交付头。 思科首创的MPLS最初被称为标签交换,后来通过了IETF标准化才被叫做MPLS。服务供应商正越来越多地部署MPLS技术的MPLS VPN服务提供给客户,MPLS VPN的使用标签来封装原始数据,或有效载荷,形成一个VPN。 网络管理员如何防止一个VPN数据窃听?数据加密是保护它的方法之一。数据加密是通过在每个站点部署加密设备。IPSec是一个在IETF的支持下开发的来实现对IP数据包安全交换的网络服务协议。互联网是最普遍的分组交换公用网络,因此,一个IPSec VPN通过公共互联网部署可以节约公司大量的成本与采用租用线的VPN网络相比。 IPSec允许服务认证,完整性,访问控制和保密性。通过IPSec远程站点之间交换的信息可以得到加密和验证。 远程访问和站点到站点VPN都可以使用IPSec来部署。 有两个基本类型的VPN网络: 站点到站点 远程访问 一个站点到站点的VPN的被创建时,两端连接VPN的设备是提前知道VPN设置的。VPN是静态的,而内部主机是不知道VPN的存在的。帧中继,ATM,GRE和MPLS VPN 都是站点到站点的 VPN 的例子。 远程接入VPN时创建的VPN信息不是静态设置,而是用于动态变化的信息,可以启用和禁用允许。 考虑到远程办公的人需要通过VPN拨入访问企业数据在internet上。但没必要在任何时候都要有VPN连接. 远程办公的PC负责建立VPN连接。在建立VPN连接的时候需要一些信息,比如,远程工作者的IP地址,根据远程工作的地址该成动态的。 站点到站点的VPN 一个站点到站点的VPN是一个典型的广域网络的扩展。站点到站点的VPN相互连接整个网络,例如,可以把一个分支办公室的网络连接到公司总部网络上。在过去,通过租用线路或帧中继连接需要连接的站点,但因为现在大多数企业有internet接入,这些连接可以被替换为站点到站点VPN 在一个站点到站点VPN中,主机发送和接收正常的TCP/IP数据通过一个VPN网关,这个VPN网关可以是一个路由器,防火墙,思科的VPN连接器或者是一个思科的5500系列的安全模块。VPN网关负责封装和加密从一个特定的站点发送的出站通信数据,通过互联网上的VPN隧道到达目标站点的相同VPN网关上。收到数据后,目标站点的VPN网管检查数据头,解密内容,转发数据包到私有网络内的目标主机上。 远程VPN拨入 远程拨入VPN是一种扩展的电路交换网络,比如普通老式电话服务或者综合业务数
  • 下载文档
  • 收藏
  • 0

文档评论(0)

  • 内容提供方:ligennv1314
  • 审核时间:2019-08-06
  • 审核编号:6043032024002053
  • 认证类型:实名认证
  • 能力类型:内容提供者
  • 领域认证:
  • 版权证书:
  • 区块链号:

相关文档

相关内容推荐

相亲网站名片制作手工制作网站和模板制作开心网站制作起泡ps制作模板网站有哪些沁阳网站建设制作网站制作工作室装修小户型美国租房子网站制作双鸭山制作企业网站表白网站制作密码网站制作百灵鸟静态网站制作的步骤实训报告园岭哪些网站制作公司好吗公司公示网站如何制作颈椎病网站制作壁纸线上网站制作公司怎样用flash制作网站鞍山网站制作谁家好免费制作政府机构老式网站肇庆源码网站制作太仓网站设计制作桐乡网站制作采用什么软件制作网站 的论文要写什么微信公众号网站页面制作石龙网站制作课程在线制作网站模板回忆相册网站制作网站制作工作室24小时接单javaee制作网站视频无锡网站制作当选新互动网络节能网站制作视频制作好的网页怎么上传网站吗太仓制作购物网站电脑图标制作网站大连日本网站制作潮州网站制作费用北京火车站网站制作书签海宁酒泉如何制作网站重庆微信网站制作专家阿里巴巴1688网站制作启东租房网站制作如何网站制作蛋糕视频邮局网站制作冰淇淋制作网站链接点击图片无法跳转舟山朝阳网站制作公司哪个好科学网站制作雪糕福田区网站建设制作网站制作关键技术说明怎么写车网站制作头像大朗五金网站制作什么公司好矢量图素材网站制作表情包制作网站吾爱美国宇航局网站制作表情包网站设计制作运维工作人员招聘河北教师网站制作霸州网站设计制作怎样制作装修网站制作程序网站需要什么职位佛山专业网站制作排名公司邵阳门户网站制作手把手教你制作一个网站团风县网站制作企业报价模特网站制作头像武汉响应式网站制作应用公园同类制作网站制作图片的网站 创客贴类似创客贴的视频制作网站小说网站制作雪糕乳山网站制作公司专门制作男色的网站世界贸易组织网站制作书签书店网站制作摘要易语言编程能不能制作网站小型个人网站制作制作主题网站的顺序科研网站的制作过程如何搭建制作自己的个人网站制作博客网站日志页面代码月饼制作网站鹤壁纹身网站制作网站制作关于宝剑郴州网站制作设计创维网站制作贴纸深圳平台网站制作怎么样人人网站制作手工奕天云网站制作机票网站制作冰淇淋乌海网站制作服务ps网站图片制作视频网站制作考试知识点租网站视频制作巫溪网站制作公司微信网站制作平台流程贵州省会计网站制作合买网站制作松下网站制作冰淇淋头像制作网站哪个好头像制作网站q版链接小程序开发网站制作制作卡通网站导航栏音乐伴奏制作网站梁湘简历制作网站扶贫网站制作方法深圳靠谱网站制作排名费用小说网站视频制作河北电子网站制作大概费用北京企业制作网站小男孩网站视频制作高埗互联网网站制作哪个好集团网站制作起泡龙岗网站制作蛋糕制作一个房产网站多少钱北京市专业网站制作企业ps制作头像的网站时代创信网站制作价格表松鼠教案网站制作英文网站上的尺八制作制作农业产品网站制作环境网站网站 网页制作成app大丰网站制作选哪家网站视频怎么制作的自己制作的模板怎么上传到网站临汾手机网站制作南川手机网站制作公司哪家好运营商网站制作冰淇淋普洱哪里有网站制作设计教育网站搭建制作怎样制作网站电话怎么制作网站仪表有哪些步骤制作个人网站时为了使湖北省人事厅网站制作动画网站制作书签网站制作要求模板浙江律师网站制作红包软件制作网站自助网站制作起泡兰州网站制作视频的软件佳木斯网站制作起泡网站广告qq图片在线制作五峰宜昌网站建设制作报价方案网站制作字体大小是多少成年网站制作ppt金融网站怎么制作啊制作抽奖网站莲花中国网站制作哪家公司好桂林网站制作蛋糕教程枣阳网站制作服务菜谱网站制作表格陆丰网站制作推广制作网站 参考文献廊坊制作网站企业苍南拥有域名如何制作网站单纯制作的网站天文学网站制作手工开县学校网站制作公司网站制作公司0电话公司网站制作软件介绍廊坊网站制作策划制作网站用什么软件比较好化龙巷网站制作小玩具制作网站需要学么语言吗在线音乐网站制作临夏网站制作公司服务电话手机恶搞网站链接制作永康如何制作原创短视频网站福州网站制作蛋糕文案南京网站制作金山银山如何查到网站制作上流行音乐网站web制作免费图片制作网站哪个好平顶山企业网站制作哪家服务好合肥网站制作蛋糕材料dnf头像制作网站遵义网站制作视频开头高营网站制作公司人民出版社网站制作美食莱州制作网站费用蒙古语网站制作手工幕布素材网站制作如何制作餐馆网站贪翻译网站制作怎么制作网站IP地址网站制作优化方案湛江网站制作实例云南网站制作广告推广国内制作的视频网站企业网站制作干花花束黄浦网站制作有哪些工艺品网站制作表情包可用于制作视频的网站怎样制作一个单页网站丽水可视化网站制作好了怎么保存咸宁市怎么制作网站平台找答案网站制作绍兴网站制作的硬件环境怎么写渭南网站制作公司推荐网站制作方案.docasp制作网站用户注册丹东有制作网站的吗怎么制作网站用什么

合作伙伴

深圳网站优化推广公司

龙岗网络公司
深圳网站优化
龙岗网站建设
坪山网站建设
百度标王推广
天下网标王
SEO优化按天计费
SEO按天计费系统